Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 2022

The 443 Security Simplified Podcast - Episode 197: Package Hijacking

This week on the podcast, we discuss the line between ethical security research and malicious activity thanks to a compromised open source software package. After that we cover the latest industry to fall victim to Ransomware and end by highlighting a 0-click vulnerability in Zoom’s message system discovered by Google Project Zero. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

WatchGuard Wins Big at the 2022 IT World Awards with Six Honors

We are proud to announce that for the seventh year in a row, WatchGuard has been recognized at the IT World Awards for 2022, securing six wins across multiple categories. This prestigious awards program honors information technology and cybersecurity vendors with advanced, ground-breaking products, solutions and services that are helping set the bar higher for others in all areas of IT and security.

Best practices for implementing the 5 most challenging technologies in cybersecurity

Technology plays a fundamental role in the transformation process that companies have embraced in recent years. However, tech decision-makers have some reservations about adopting the latest technologies to avoid putting corporate security at risk. These are the findings of the Pulse survey of 150 technology leaders, in which 65% say they will avoid implementing AI, Hybrid Cloud, Edge Computing, 5G and Container Security because of the complexity required to implement them securely.

WatchGuard Launches PSIRT Page

WatchGuard’s Product Security Incident Response Team (PSIRT) has launched our public PSIRT page to provide a consolidated resource where network administrators can find advisories and information about security vulnerabilities in WatchGuard products, as well as WatchGuard’s investigations into industry-wide security issues that may impact our products or services.

Webinar: Outsourced or In-House? How to Choose the Best Approach for Your Organization - 25 May 2022

We know why the cost of cyber attacks continues to rise (hybrid work, more sophisticated breaches, etc.). Today's hybrid work model requires a security approach that provides intelligent protection for environments, users, and devices. Which security model is right for your organization, considering the current threat landscape? In this webinar, Our Chief Information Officer, Wayson Vannatta, will discuss strategies that IT leaders can use develop the security approach to thrive in an ever-changing risk environment, without added complexity.

Is GDPR a priority for businesses in 2022?

Data privacy is a priority objective for businesses today, particularly after the European Union's General Data Protection Regulation (GDPR) became enforceable in 2018, as this law protects European citizens’ personal data and requires organizations to change some of their work processes.

Cyberattacks Targeting NFT Marketplaces and Cryptographic Aficionados

Everything technology touches gets a digital makeover and the creative space wouldn’t be the exception. Non-fungible tokens (NFTs) are virtual assets that represent objects influenced by art, music, games, and videos. You can only buy them online, likely with cryptocurrency. NFTs are generally encoded with the same underlying software as many cryptos. In fact, they are part of the Ethereum blockchain, a cryptocurrency, like bitcoin or dogecoin.

The 443 Security Simplified Podcast - Episode 196: Building Security Strategies with Matt Lee

In this special video edition of The 443 Security Simplified, we sit down for a chat with Matt Lee, Sr. Director of Security and Compliance at Pax8 and well-known cyber security educator, to discuss security strategies for MSPs and midsize enterprises in the face of a dynamic threat landscape. We cover everything from picking a framework to getting buy in from stakeholders and take a forward look at what future cyber regulations may look like to all organizations.

What cybersecurity challenges do SOCs face in the coming months?

A security operations center (SOC) is the centralized security team that deploys the tools needed to continuously monitor and improve an organization's security approach while also preventing, detecting, analyzing and responding to security alerts. You could say the SOC acts as the central command of an organization's security, bringing together its entire IT infrastructure, including its networks, devices and company data, both inside the corporate perimeter and outside.

Webinar: Outsourced Cybersecurity or In-House? How to Choose the Best Approach for Your Organization

The coronavirus pandemic created new challenges for businesses as they adapt to an operating model in which working from home has become the ‘new normal. In addition, threat actors constantly change their strategies, tools, and techniques. When their attacks become less effective, they look for new weaknesses to expose and move to.

Cybersecurity in education, key for 1 out of 10 partners

A few weeks ago, we reported how the new wave of phishing that uses new variants of COVID-19 as bait had hit the education sector hard. Many students at universities and colleges across the United States were victims of phishing attacks via emails pretending to be from administrators at their institutions.

7 warning signs indicating you need to change your endpoint security solution

Nowadays, there is a wide range of solutions on the market that claim to safeguard the security of corporate computers and networks. Benefits such as protection against sophisticated malware attacks, good performance when running processes, usability or quality technical support should be the norm, but this is not always the case.

WatchGuard honored at the 2022 TrustRadius Awards

We are honored to share that WatchGuard has been recognized with six awards in the 2022 TrustRadius Top Rated Awards! WatchGuard received the Top Rated award for Network Security with WatchGuard Firebox (2 awards), WatchGuard EDPR / Adaptive Defense 360 (1 award) and AuthPoint (3 awards). For the first time since it was added to the WatchGuard portfolio, our Endpoint solutions have received the Top Rated award in the XDR category.

WatchGuard Honored in the 2022 Globee Sales, Marketing, Customer Success, and Operations Awards

We are honored to announce that WatchGuard was named a Grand Globee Winner at the 2022 Globee Sales, Marketing, Customer Success, and Operations Awards! This annual awards program honors industry-wide individuals and teams that create great experiences for their customers. WatchGuard was recognized for its philosophy of technician enablement and continued upgrades to processes and applications to make the team even more effective in assisting customers.

What Is Ransomcloud?

Tech decision makers surveyed by Pulse admitted last year that nearly 3 out of 4 companies (71%) experienced a ransomware incident and at least 12% of these incidents involved payments. This shows that ransomware attacks are proving to be a lucrative business for malicious cyber actors as they constantly put organizations’ cybersecurity measures to the test in a host of different sectors where different IT architectures are used.

Not decided about adopting a corporate password manager? I'll give you 9 reasons to do that

Teaching about password security in the early 2000s would usually start with a question to the audience: how many of you have up to 10 passwords to remember? How about 25? Anyone with more than 50? Today I usually start with “how many credentials do you believe to have still active? Less than a hundred?”

Wi-Fi and its relationship with the zero-trust model

Zero-trust network architecture (ZTNA) provides a holistic view of business cybersecurity that secures your applications and environment when accessed by any user, device, or location. A comprehensive zero-trust model enables you to mitigate, detect and respond to threats.