WatchGuard has been named Leader in the latest G2 Grid Report and honored with the TrustRadius Buyer’s Choice and Top-Rated Awards. To this, we now add that WatchGuard Network Security, WatchGuard AuthPoint, WatchGuard Endpoint Security have been approved for the Trusted Seller verification!
This week on the podcast, we discuss a recent update from Microsoft's Threat Intelligence Center describing the latest tactics from Silk Typhoon, a Chinese nation state threat actor focusing in espionage. Before that, we cover the recent 0day vulnerabilities in VMware ESXi, Workstation and Fusion. We also analyze a report by S-RM on an Akira ransomware attack that leveraged IoT devices to hide from EDR tools.
Cyber threats don’t stop, just like Pi (π). That doesn’t mean your security should be stuck in an endless loop of updates, patching, and stress. WatchGuard delivers real security - tailored to you, eliminating complexity, and keeping you ahead of threats. This Pi Day (3.14), let’s celebrate security that works.
The modern attack surface has shifted beyond endpoints to SaaS applications and cloud identities. Traditional security tools focused solely on endpoint telemetry miss sophisticated attacks that never touch the endpoint. Join Ken Westin to explore how LimaCharlie's adapters provide comprehensive visibility across your SaaS environment. We'll demonstrate collecting and analyzing telemetry from business-critical applications like 1Password and GitHub, plus newly supported platforms like HubSpot.
On this episode of The Cybersecurity Defenders Podcast we speak with Andrew Cook, CTO of Recon InfoSec, about lessons learned scaling Managed Security Operations.
It’s Monday morning and the coffee shop is full of telecommuters, sipping lattes and catching up on emails. The way organizations enable work has changed. With the rise of SaaS applications and cloud-first strategies, employees, contractors and third parties frequently access corporate assets from personal, unmanaged laptops.