Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

The 443 Podcast Episode 203 - USA's Answer to GDPR

This week on the podcast, we discuss the current cyber skills gab and a federal program designed to help combat it. After that, we dive in to the American Data Privacy protection Act and what it potentially means if passed by US Congress. We end this week with a quick update on Microsoft's attempts to protect users from malicious macro-enabled documents. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

7 Key Features That MSPs Need from a Cybersecurity Vendor

Customer trust is the biggest success indicator for MSPs. And yet, it’s only achieved with the right vendor partnerships. MSPs and MSSPs need to choose cybersecurity vendors with tailored and strategic portfolios that can cater to the emerging needs of each customer. Therefore, MSPs need a cybersecurity vendor that both understands this approach and delivers it to offer the greatest possible value. When vetting a cybersecurity vendor, MSPs should look for the following seven features.

The 443 Podcast Episode 202 - Rolling PWN

This week on the podcast we cover the latest in car hacking research, this time targeting vulnerabilities in remote keyless entry. We then dive in to Microsoft's latest research on Adversary in the Middle (AitM) attacks and end with key findings from the latest WatchGuard Threat Lab quarterly Internet Security Report. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Usability, the key to cybersecurity in small and medium-sized businesses

In the case of small businesses, it is well known that employees are even more important as the first line of defense in cybersecurity, as small businesses often do not have the specialized personnel or the resources of large organizations to invest in training them. The available data confirms this: in the United Kingdom alone, 38% of SMEs suffered a cyberattack in 2021, according to a report by the UK Government.

The Rise of Endpoint Security Risks: 6 Common Types

With flexible work environments now the norm, the use of endpoint devices has increased – whether your organization allows work-from-home days, hires freelancers, and collaborates through email and phone calls. Many employees require access to the corporate network to carry out their daily responsibilities, and endpoint devices allow employees to do just that. That said, endpoints have become one of the biggest attack vectors for cybercriminals since they are easier to target.

Cyberattack framework: What is the cyber kill chain?

In the early 2000s, Lockheed Martin defined the cyberattack chain framework to identify what adversaries must complete in order to achieve their objective. Today, we look at how the growing sophistication of adversaries and sheer number of threats is intensifying pressure on CISOs and IT teams and is increasing their workloads, which all has negative impacts on businesses and organizations.

Webinar: Top Security Threats Worldwide: Q1 2022 - 30 June 2022

Join WatchGuard CSO Corey Nachreiner and Security Engineer Trevor Collins as they cover the latest Internet Security Report from the WatchGuard Threat Lab. In this session, Corey and Trevor will dive into the attack trends and latest malware variants targeting WatchGuard Firebox and Endpoint customers worldwide.

WatchGuard EPDR certified by OPSWAT as Gold Anti-malware

WatchGuard has obtained OPSWAT's GOLD distinctive insignia as a certified provider, demonstrating that its applications are powerful, reliable, and efficient. Products that receive the OPSWAT GOLD certification, such as WatchGuard EPDR, are highly compatible with the industry's leading NAC and SSL-VPN solutions, such as Citrix Access Gateway, Juniper Host Checker, F5 FirePass, etc. Gold-certified products can be detected by these solutions, and some remediation and evaluation actions are supported.