Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard Wins Seven Awards at 2023 Global InfoSec Awards

We’re thrilled to share that Cyber Defense Magazine has once again awarded WatchGuard with seven wins at this year’s Global InfoSec Awards! The judges of this coveted awards program selected the 2023 winners based on three key areas of excellence including nominees’ understanding of tomorrow’s threats, today, provision of cost-effective solutions, and innovation in new and novel ways that help to better mitigate cyber risk and stay ahead of the next breach.

The 443 Podcast, Ep. 238 - Zero Trust Maturity Model 2.0

This week on #the443podcast, Corey Nachreiner and Marc Laliberte cover two new publications out of CISA. First, we dive into CISA’s guidance to manufacturers and customers on secure-by-design and secure-by-default products. Next, they discuss CISA’s latest Zero Trust Maturity Model, which any organization can use to gauge how far along they are on the ZTA path and where they should focus their efforts next. Finally, we end with some research from Blaze Information Security on a series of vulnerabilities in a play-to-earn blockchain game.

Webinar: Top Security Threats Worldwide: Q4 2022 - 20 April 2023

Join WatchGuard CSO Corey Nachreiner and Sr. Security Analyst Trevor Collins as they discuss key findings from the WatchGuard Threat Lab’s 2022 Q4 Internet Security Report. They’ll cover the latest malware and network attack trends targeting small and midsized enterprises and defensive tips you can take back to your organization to stay ahead of modern threat actor tactics.

The 443 Podcast, Ep. 237 - Operation Cookie Monster

This week on the podcast, Corey Nachreiner and Marc Laliberte discuss another cybercrime marketplace takedown dubbed Operation Cookie Monster. After that, they discuss Microsoft’s attempts to limit the distribution of a popular hacking toolkit. Finally, we discuss a recent analysis by Dr. Ken Tindell of Canis Automotive Labs about how criminals could steal his friend’s Toyota Rav4.

Why MSPs should add MFA and endpoint protection to firewalls in their security offerings

Firewalls are a key component in cybersecurity to protect corporate networks from external threats. However, these barriers must be accompanied by solutions that complement each other and build a layered security posture to help prevent vulnerabilities from exposing networks to malicious activity, at all and any cost.

Unified vs API-Based Integrated XDR Platform: What's the difference?

The terms unified and integrated are often used interchangeably in the software world. However, security leaders must understand the differences between deeply unified and API-based integrated platforms within an organization and how they can significantly impact everything from cost to efficiency. First, it is essential to define the terms.

The 443 Podcast, Ep. 236 - Another Software Supply Chain Attack

This week on The 443, Corey Nachreiner and Marc Laliberte discuss the latest software supply chain attack with a potential blast radius of thousands of organizations. They then cover a new protocol vulnerability in the Wi-Fi wireless standard before ending with some research into insecure Microsoft Azure applications.

The 443 Episode 238 - Zero Trust Maturity Model 2.0

This week on the podcast, we cover two new publications out of CISA. First, we dive into CISA's guidance to manufacturers and customers on products that are secure-by-design and secure-by-default. Next, we discuss CISA's latest Zero Trust Maturity Model which any organization can use to gauge how far along they are on the ZTA path and where the should focus their efforts next. Finally, we end wit some research from Blaze Information Security on a series of vulnerabilities in a play-to-earn blockchain game.