Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

The 443 Podcast - Episode 259 - iPhone's Latest 0-Day

This week on the podcast, we cover Microsoft's final report on their July incident involving nation-state actors compromising enterprise email accounts. After that, we discuss a zero-day, zero-click vulnerability in iOS being actively exploited in the wild before ending with a chat about an upcoming change to how Android handles CA certificates. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

How MSPs are Improving Business Models with Unified Security Services

Historically, MSPs have offered a broad portfolio of outsourced IT products and services, but not cybersecurity. Demand for security services from companies of all types and sizes is rising significantly now due to the steady rise in cyberattacks. According to a recent survey, 52% of MSPs state that cybersecurity is the most requested offering by customers. Adding security services to their portfolios gives MSPs the opportunity to reinvent themselves and access a broader customer base.

The SecOps Cloud Platform Ecosystem

A hosted panel discussion with industry leaders to explore what advantages the SecOps Cloud Platform confers for ecosystem builders. The panel is moderated by LimaCharlie's Head of Product, Matt Bromiley. The panel participants are: Senior Security Researcher at Thinkst, Casey Smith Security Evangelist at RunZero, Huxley Barbee Head of Tines Labs, John Tuckner.

Securing Endpoints By Applying 'Passive Income' Concepts

Investing in cybersecurity is a lot like working hard to save for retirement. Your budget’s already tight, but you must secure the future. You’re faced with endless headlines and market updates that make you nervous about making the wrong choices – or not making moves quickly enough amid fast-changing conditions.

Endpoint Security: More Than Just Windows Machines

Let's talk endpoint security with a dose of reality! 🛡️💻 In this eye-opening discussion, we explore the concept that attackers ultimately aim for an endpoint. But here's the catch: defining what an endpoint means in today's complex digital landscape isn't as straightforward as it seems. If your idea of an endpoint is limited to just Windows machines, you might be in for a surprise. There's a lot more to it! 🌐

A Timeline of the Top 15 Cybersecurity Acronyms & Abbreviations

At WatchGuard, we’re all about security simplified. But living this mission becomes challenging when we’re constantly faced with a barrage of information technology (IT) acronym soup. Whenever I read the latest blog post or I hear the latest cybersecurity news, one of those dreaded acronyms inevitably appears. In IT, the acronyms are prolific.

Deciphering alphabet soup: IoCs and IoAs

Security Operations teams are the cornerstone of the fight against last-mile cybercrime in any organization. This is why they need the most advanced technologies possible.But the fight against cybercriminals isn’t simply a question of technology. Having a proactive attitude against possible cyberattacks is also key. This is where we see two essential concepts for all Security Operations teams: IoCs (indicators of compromise) and IoAs (indicators of attack). What is the difference?