Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November 2022

How to prevent a rootkit attack before it is too late?

A rootkit is a malicious software program that helps cybercriminals infiltrate a system and take control. Hackers use rootkits to carry out espionage, data theft, deploy other malware such as ransomware, and all without leaving a trace. Once a rootkit is installed on a device, it can intercept system calls, replace software and processes and be part of a larger exploit kit containing other modules such as keyloggers, data theft malware, or even cryptocurrency mining malware.

The 443 Episode 219 - CISA Incident Response Learnings

On today's episode we cover a pair of alerts from the Cybersecurity Infrastructure and Security Agency (CISA), one detailing the tools, tactics and procedures from a prolific ransomware organization and another walking through a recent incident response engagement CISA completed with a federal agency. Before that though, we learn about what happens when you use a software component that hasn't received updates in 17 years.

Why endpoint security and MFA should always go together

The current cyberattack landscape has forced companies to look for new forms of protection, which is why they are increasingly resorting to the use of cyber insurance. The figures are alarming: 148,104 malware attacks are launched every day, which translates into 6,172 attacks per hour. The consequences of a breach can mean dedicating a large part of a company’s resources to restoring computer systems and dealing with any ensuing penalties and lawsuits.

Modern SOCs and MDR Services Series: 6 Benefits and Why They Matter

The growing number and complexity of threats, combined with the expansion of the attack surface, complicate the primary purpose of a SOC: detecting, analyzing, and responding to security incidents. These factors generate exponential growth in data volume and security alerts, which teams need more resources to address.

The 443 Episode 218 - Attack Surface Management

This week on the podcast we dive into the world of attack surface management. We discuss what your attack surface is made up of including some areas you may not have thought of and then cover the best ways to reduce and ultimately protect it. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

80% of companies experience security incidents in the Cloud

Migrating to the Cloud brings many advantages for companies. First of all, they reduce their operating costs by almost 40%. They also increase their agility, reduce the maintenance time of traditional IT infrastructures, and gain flexibility and scalability. However, as the number of workloads deployed in the Cloud grows, more and more organizations are struggling to keep pace with security requirements.

CRN Names WatchGuard to the 2022 Edge Computing 100 list

WatchGuard has been recognized by CRN in the 2022 Edge Computing 100 list in the Security category. This prestigious list highlights leading technology innovators that supply channel partners with next-generation edge technologies that allow businesses to capture, process, and use data in more intelligent ways. The categories recognized in this list include Edge Hardware, Software and Services; IoT and 5G Edge Services; and Security.

Demo: Upgrading a Firebox

Because smaller companies are generally less protected and easier to break into, small business has become the new "big target" for cyberattacks. The Firebox M390 firewall is specifically engineered to defend all types of small businesses against attacks that are no less fierce than those targeting larger organizations. In this video, we show just how simple it is to upgrade your firewalls to the M390 with the optional Total Security Suite.

Modern SOC and MDR services series I: What they are, why they matter

Inadequate cybersecurity is a severe issue that challenges SMBs and enterprises indiscriminately, putting them at risk. Reasons for the business impact include: To help businesses navigate cybersecurity risks, many delegate to internal or external security operation centers (SOC).

Mobile device DNA: what is and why should your MFA solution have it?

Multi-factor authentication adoption is booming. Regulatory pressures from different global initiatives, combined with companies making it a prerequisite to use their services and the rise in implementing the zero-trust model, have increased spending on this solution. The MFA market is estimated to be worth $12.9 billion and is expected to reach $26.7 billion by 2027, with an annual growth rate of 15.6% from 2022 to 2027.

Webinar: The Critical Factors to Look for in a Cybersecurity Vendor - 10 November 2022

Are you assessing which cybersecurity vendor to use for your business, or even consolidating to just one? There are some key characteristics and business strategies you’ll want to consider. We’ve turned to global business leaders to share their experience vetting cybersecurity vendors and even trends in the security industry that influenced their choice. WatchGuard’s Chief Information Officer Wayson Vannatta will host our four panelists.

WatchGuard Cloud Honored at TMCnet's Cloud Computing Security Excellence Awards for 2022

For the third year in a row, TMCnet recognized WatchGuard Cloud with a 2022 Cloud Computing Security Award. This prestigious awards program honors solutions that most effectively leverage cloud platforms to deliver network security. With the ever-increasing number of hacks and intrusions, ensuring the security of applications, services, data and devices has never been more critical.

The biggest threat remote access poses: exposing your server on the Internet

The rise in working from home has popularized remote access to the company workplace. Although remote work increases productivity and facilitates some operations, it may also be the gateway that cybercriminals have been waiting for. According to the latest 2022 Verizon Data Breach Investigations Report, misuse of remote access is the fourth most common initial attack vector.

WatchGuard recognized at the 2022 TrustRadius Best Software List

We’re thrilled to share that WatchGuard has been recognized in the 2022 TrustRadius Best Software List! The first-ever TrustRadius Best Software List celebrates products that support the evolution of self-serve buyers by sourcing and using customer reviews. To make the list, products must have 40+ reviews from the past year and have maintained a trScore of 7.5 or higher. These characteristics demonstrate a commitment to transparency, improvement, and user insights.