How the future of privilege is reshaping compliance

If privilege has changed, compliance can’t stay static. As organizations accelerate digital transformation, the compliance landscape is shifting beneath their feet—especially when it comes to how privileged access is controlled and proven. Regulatory requirements are multiplying, audit cycles are tightening, and the definition of privileged access has quietly expanded beyond people to workloads, automation, and AI-driven systems.

The New ionCube Forum - A place for ionCube users to help eachother out and discuss all things ionCube

Change is coming Some people don’t like change. Change is inevitable. And sometimes, change can be a good thing too. A while back we took our old phpBB2 forum offline (Find out why – here). As expected, that decision prompted a range of reactions and some understandable concerns from members of the community. The reasons behind that choice, including why we knew it would not work for everyone, are set out in the original post and remain unchanged.

Decoding MITRE ER7: How to Interpret Results That Matter

MITRE ATT&CK Evaluations attract strong attention across the cybersecurity industry by providing detailed, transparent data on how endpoint security solutions behave under real attack conditions. However, the depth of the results often makes them difficult to interpret and compare meaningfully. Join Field CTO Adam Winston as he decodes WatchGuard’s MITRE ER7 results and learn how to weigh key metrics to determine real-world security effectiveness and efficiency.

When Your AI Agent Goes Rogue: The Hidden Risk of Excessive Agency

In Oct 2025, a malicious code in AI agent server stole thousands of emails with just one line of code. The package, called postmark-mcp, looked completely legitimate. It worked perfectly for 15 versions. Then, on version 1.0.16, the developer slipped in a tiny change. every outgoing email now included a hidden BCC to an attacker-controlled address. By the time anyone noticed, roughly 300 organizations had been compromised. Password resets, invoices, customer data, internal correspondence.

How to Align Your DevSecOps Framework with Software Supply Chain Security

A strong DevSecOps framework integrates security into every stage of the software development lifecycle (SDLC). But as development accelerates, reliance on third-party and open-source code grows, introducing significant risks from the software supply chain. Aligning your DevSecOps framework to address these specific threats is no longer optional. It’s essential for building resilient and secure applications.

10 AI SOC Benefits That Actually Transform Security Operations

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo Your SOC is drowning. Industry estimates suggest that up to 60% of SOC analyst time is spent on Tier 1 triage, leaving less time for addressing real threats. According to Splunk’s State of Security 2025 report, 59% of security teams report being overwhelmed by too many alerts, and 55% waste precious hours chasing false positives.

Uncovering A Mass VPN Phishing Campaign - The 443 Podcast - Episode 355

This week on the podcast, we cover some first-hand research from the WatchGuard Threat Lab on a phishing campaign targeting users of nearly every major VPN vendor. After that, we discuss two recently resolved vulnerabilities in the Fortinet FortiSIEM application, then end with research from Varonis on a new attack flow against Copilot called RePrompt.

Facebook tech support scams on the rise: How cybercriminals are turning your feed into a trap

From fake ads to tech support fraud, see how scammers exploit Facebook and how to protect your data and money. Facebook may feel like a safe place to connect, but scammers are increasingly using its ads, posts, and messages to deceive users. Here’s how cybercriminals are turning your feed into a gateway for fraud and what you can do to stay protected. When you open Facebook, you might expect birthday alerts, travel snapshots, or quick messages with friends.

A New Security-Focused Path Search View for Faster, Clearer Analysis

Security teams frequently investigate whether traffic is allowed, denied, or translated along a path, but traditional visualization methods create unnecessary complexity. A standard Path Search view includes every L2 and L3 hop—switches, routers, and intermediary devices that participate in forwarding but apply no security policy. While this depth is helpful for network troubleshooting, it overwhelms analysts focused specifically on enforcement points.

Switch from SonicWall and Succeed

If you use SonicWall, you know what type of year 2025 was for your business. Between breaches, price increases, and confusing pivots, your vendor left you to clean up their mess while you paid more for their product and earned less in return. Join Adam Winston, Field CTO at WatchGuard Technologies, to learn why our Unified Security Platform is the right choice for a profitable, worry-free 2026. In this session, we’ll discuss.