Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard Recognized in BIG's 2023 Excellence in Customer Service Awards

We’re thrilled to share that the Business Intelligence Group has named WatchGuard’s George Grinnell an “Executive of the Year” winner and recognized WatchGuard’s Mark Allan Marra with a win in the “Manager of the Year” category as part of its 2023 Excellence in Customer Service Awards! Business Intelligence Group has also honored WatchGuard’s Customer Support team as a finalist in the “Organization of the Year” category.

The 443 Episode 237 - Operation Cookie Monster

This week on the podcast, we discuss another cybercrime marketplace takedown dubbed Operation Cookie Monster. After that, we discuss Microsoft's attempts to limit the distribution of a popular hacking toolkit. Finally, we discuss a recent analysis by Dr. Ken Tindell of Canis Automotive Labs around how criminals were able to steal his friend's Toyota Rav4. You can view Dr. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Five cybercriminal entities sell access to 2,300 corporate networks

It’s not possible to talk about a successful cyberattack without prior access to the target company's network. Initial access brokers (IABs) are the malicious actors that perform this first step, and they are making accessing enterprise networks easier than ever.

The 443 Episode 236 - Another Software Supply Chain Attack

This week on The 443, we discuss the latest software supply chain attack with a potential blast radius of thousands of organizations. Then we cover a new protocol vulnerability in the Wi-Fi wireless standard before ending with some research into insecure Microsoft Azure applications. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

4 opportunities MSPs can leverage from cyber insurance

The rapid escalation of cyberattacks around the world has increased the number of prerequisites to qualify for a cyber insurance policy. If a business faces a cyberattack involving a data breach, it may find it hard to recover without additional support or resources. And this is just one example.

LC101: Writing detection and response rules

LimaCharlie is a cybersecurity middleware platform to connect sources of security telemetry, automate activity based on what's being observed, and forward data where you need it. LimaCharlie puts you in complete control of your data, allowing you to build the security program that your organization wants and needs. In our next session, join Matt Bromiley, our Lead Solutions engineer, to continue the discussion in getting familiar with LimaCharlie's detection and response capabilities..

3 tips on how to differentiate XDR from EDR

Cybersecurity solutions have evolved from a basic investigation and discovery technology to behavioral analysis solutions that enable real-time detection and response. However, if they are to be truly effective, they must also protect against anomalous behavior that may seem harmless on its own, but after gaining a bigger picture by correlating and contextualizing detections, turns out to be an incident that needs to be responded to as soon as possible.