Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

#187 - Automation in MSSP Operations with David Burkett, Cloud Security Researcher at Corelight

On this episode of The Cybersecurity Defenders Podcast we talk about automation in MSSP operations with David Burkett, Cloud Security Researcher at Core light. David has deep expertise in cloud threat detection and automation. Over the course of his career, David has built and optimized three different Cyber Security Operations Centers for MSSP and MDR providers, demonstrating his unparalleled skill in scaling security operations through automation and efficient processes.

AI in Cybersecurity: 20 years of innovation

From predictive systems to the recent proliferation of generative AI-based virtual assistants such as ChatGPT, artificial intelligence has become a key driver in many sectors, and cybersecurity is no exception. The disruptive impact of GenAI has popularized AI use recently but this technology has actually been deployed for over 20 years in the security sector, serving as an additional and critical tool for proactive threat management that enhances operational efficiency.

Single sign-on (SSO), simplify access and protect your business

Enterprises today are facing a complex working environment, where digitalization is advancing by leaps and bounds and technological tools are multiplying. This change has brought with it a key challenge: protecting and managing access to sensitive data. IT teams are overloaded with password-related tickets, while employees are dealing with multiple credential-management fatigue, a problem that affects both productivity and security.

McHacking - The 443 Podcast - Episode 317

This week on the podcast, we cover security researcher Eaton Zveare's recent blog post on a trove of vulnerabilities they found in McDonalds India's McDelivery web application. Before that, we give an update on Salt Typhoon's latest US government victim and discus an attack involving hijacked Google Chrome extensions. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Endpoint Management: Best Practices to Secure Every Device Across Your Network

Endpoint management is an important part of network protection in today's digital world because everything is connected. As more devices, like computers, smartphones, and Internet of Things (IoT) gadgets, appear on the market, it becomes harder for businesses to keep their networks safe. A study from 2023 on cybersecurity says that over 70% of data breaches are caused by endpoints that have been hacked.

WatchGuard Acquires ActZero to Add Scalable and Open-Platform AI Security to Deliver Simplified 24/7 MDR Services

With demand for WatchGuard's existing MDR service soaring, this acquisition lets MSPs easily add best-in-class MDR capabilities without building and maintaining their own in-house security operations center (SOC).

#177 - Intel Chat: Supply-Chain Firewall, Scattered Spider, Linux malware & another NTLM exploit

In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel. The live stream mentioned in this episode for the Cybersecurity Cares Fundraising efforts for Becky’s Fund took place on December 19, 2024.

WatchGuard Acquires ActZero to Accelerate Delivery of 24/7 MDR Services

WatchGuard acquired ActZero, a leading provider of MDR services with proactive, rapid and automated threat response and cross-platform AI-driven threat analysis designed to outpace threats at machine speed. This move further expands and matures WatchGuard’s innovative 24/7 MDR service and was signed and closed on December 17, 2024.

Efficient Endpoint Management for Better Security

Endpoint management is a key part of keeping businesses safe from cyber dangers that are getting worse. Every device on your network, from computers to smartphones, is an endpoint. This means that hackers have a lot more places they can attack. Endpoint control that works well is not only a strategic must, but also a key part of strong cybersecurity.