Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

2025 Ends With a Bang - The 443 - Episode 352

This week on the podcast, we cover a wave of attacks against network edge equipment and internet-exposed systems including an update on the recently patched Firebox 0-Day. After that, we cover two stories on browser extensions siphoning off data and making unwanted modifications to victim’s web browsing activity.

What Every Security Leader Must Prepare for in 2026

As organizations accelerate toward 2026, the cybersecurity landscape is becoming more complex, more unpredictable, and more heavily influenced by fast-evolving technologies like generative AI. Threat actors are moving with unprecedented speed, regulatory demands are increasing, and the tools and techniques needed to defend modern environments are shifting just as rapidly.

Introducing WatchGuard's Zero Trust Bundle: Zero Trust for the Way You Work

Hybrid work, cloud apps, and constant connectivity have completely reshaped how people get things done. But they've also reshaped how attackers operate. Today, most breaches begin with fundamental issues: stolen credentials, compromised devices, or remote access tools that weren't designed for a world of distributed users. That's why WatchGuard is introducing the Zero Trust Bundle, a unified approach that secures people, devices, and access decisions every time someone connects to your business.

Webinar: Unleash Your 2026 Potential with WatchGuard

If you’re a SonicWall partner, chances are 2025 tested your patience, and your margins. Between high-profile breaches, unexpected price increases, and strategic pivots that created more confusion than clarity, many partners were left absorbing the fallout while working harder for less return. As the security landscape continues to evolve, partners deserve a platform that simplifies operations, protects customers, and supports sustainable growth.

In the Digital Era, Security Starts with Identity

A few years ago, an IP address was enough to identify users online ‒ almost like a physical address that indicated where they were located. Today, however, users no longer rely on a single device or location, making it far more difficult for organizations to recognize who is accessing their systems, from where, and with what level of risk.

Cyber Hygiene and Compliance: Why You Need More Than Just Best Practices

Over the years, corporate digital infrastructure has grown in terms of both complexity and scale. As a result, cybersecurity has become increasingly critical within organizations. However, despite this reality, it’s often basic mistakes that leave companies exposed. That’s why it’s always good practice to go back to the fundamentals.

2026 Security Predictions

As cyber threats evolve at an unprecedented speed, 2026 promises to be a transformative year for cybersecurity. Traditional threats are giving way to more sophisticated strategies, driven by AI, regulatory pressures, and the need for zero trust. In this webinar, CSO Corey Nachreiner, Director of Security Operations Marc Laliberte, and Field CTO for Managed Services Adam Winston will discuss their six game-changing predictions for this upcoming year, including.