Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

Trustwave and Microsoft Defender for Endpoint Integration

Trustwave Managed Detection and Response services integrate with Microsoft Defender for Endpoint to take containment, eradication, and recovery actions directly on the endpoint, delivering a streamlined experience for the end users. For further information on how to truly integrate your cyber defense team with industry-leading services and technologies, watch our overview of how Trustwave partners with Microsoft.

Three reasons why Security Operations Centers (SOCs) are adopted

Company IT and security teams are facing cybersecurity challenges that increasingly test their defensive capabilities. Organizations have to protect themselves from a growing number of incidents (one attack every 39 seconds, according to the University of Maryland) and sophisticated threats, many of which have serious consequences.

The 443 Security Simplified Podcast - Episode 197: Package Hijacking

This week on the podcast, we discuss the line between ethical security research and malicious activity thanks to a compromised open source software package. After that we cover the latest industry to fall victim to Ransomware and end by highlighting a 0-click vulnerability in Zoom’s message system discovered by Google Project Zero. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

WatchGuard Wins Big at the 2022 IT World Awards with Six Honors

We are proud to announce that for the seventh year in a row, WatchGuard has been recognized at the IT World Awards for 2022, securing six wins across multiple categories. This prestigious awards program honors information technology and cybersecurity vendors with advanced, ground-breaking products, solutions and services that are helping set the bar higher for others in all areas of IT and security.

Best practices for implementing the 5 most challenging technologies in cybersecurity

Technology plays a fundamental role in the transformation process that companies have embraced in recent years. However, tech decision-makers have some reservations about adopting the latest technologies to avoid putting corporate security at risk. These are the findings of the Pulse survey of 150 technology leaders, in which 65% say they will avoid implementing AI, Hybrid Cloud, Edge Computing, 5G and Container Security because of the complexity required to implement them securely.

WatchGuard Launches PSIRT Page

WatchGuard’s Product Security Incident Response Team (PSIRT) has launched our public PSIRT page to provide a consolidated resource where network administrators can find advisories and information about security vulnerabilities in WatchGuard products, as well as WatchGuard’s investigations into industry-wide security issues that may impact our products or services.

Webinar: Outsourced or In-House? How to Choose the Best Approach for Your Organization - 25 May 2022

We know why the cost of cyber attacks continues to rise (hybrid work, more sophisticated breaches, etc.). Today's hybrid work model requires a security approach that provides intelligent protection for environments, users, and devices. Which security model is right for your organization, considering the current threat landscape? In this webinar, Our Chief Information Officer, Wayson Vannatta, will discuss strategies that IT leaders can use develop the security approach to thrive in an ever-changing risk environment, without added complexity.

Is GDPR a priority for businesses in 2022?

Data privacy is a priority objective for businesses today, particularly after the European Union's General Data Protection Regulation (GDPR) became enforceable in 2018, as this law protects European citizens’ personal data and requires organizations to change some of their work processes.

Cyberattacks Targeting NFT Marketplaces and Cryptographic Aficionados

Everything technology touches gets a digital makeover and the creative space wouldn’t be the exception. Non-fungible tokens (NFTs) are virtual assets that represent objects influenced by art, music, games, and videos. You can only buy them online, likely with cryptocurrency. NFTs are generally encoded with the same underlying software as many cryptos. In fact, they are part of the Ethereum blockchain, a cryptocurrency, like bitcoin or dogecoin.

How to stay ahead of the Cybersecurity labor crisis and keep growing your business

Cybersecurity is a complex task that is never complete. It’s an ongoing proactive practice of securing, monitoring, and mitigating threats. It’s a constant cycle where threats and vulnerabilities are detected, teams investigate and mitigate any issues, then network cybersecurity systems are reinforced to combat the next potential threat. Business operations increasingly rely on numerous devices and digital tools to accomplish daily tasks.