Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Weak Authentication Attacks: 49% report high costs

Cyberattacks on large companies grab the headlines, creating the false impression that only big organizations are targeted by cybercriminals. This misleads smaller companies into believing that they are not potential targets because of their size or low profile. However, threats against small and medium-sized companies have been a cause for concern in recent years. Experts warn that companies with fewer than 100 employees are especially vulnerable to a range of threats.

The 443 Podcast - Episode 284 - A Bad Month for Software Supply Chains

This week on the podcast, we cover a software supply chain attack years in the making that was days away from a devastating global impact. After that, we cover Facebook's Project Ghostbusters and its impact on user privacy before ending with another software supply chain attack that successfully compromised developers in the gaming world. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

(Re)Discover the Hidden Value of Single Sign-On

Modern zero trust is an information security model that denies users and devices access to applications, data, networks, and workloads by default. One of the optimal ways to help reduce credential-based attacks with applications is to leverage single sign-on (SSO) as part of your access management strategy. SSO combines simplicity with security by removing friction for users to access applications and reducing the administrative overhead and risks for IT associated with password management.

WatchGuard Earns 8th Consecutive 5-Star Rating in CRN's 2024 Partner Program Guide

CRN has once again honored WatchGuard with a prestigious 5-star rating in its annual Partner Program Guide! The 2024 recognition marks the 8th consecutive year that the WatchGuardONE partner program has earned top marks in CRN’s definitive directory of the most rewarding partner programs for the IT channel.

The 443 Podcast - Episode 283 - Trucking Worms

This week on the podcast we discuss a vulnerability in required commercial truck hardware that could enable an automatically propagating worm across the entire US. Before that, we cover Apple's "un-patchable" vulnerability in their M-series processors as well as a vulnerability that could let attackers unlock hotel room doors at will. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

NEW! Elastic Security 8.13: Manage benchmark rules and automated endpoint responses

Elastic Security 8.13 introduces a refined benchmark-rules experience, advanced endpoint response actions, and a suite of enhancements to help users continue to accelerate their security program. Some of the major features included in this release enable users to: Elastic Security 8.13 is available now on Elastic Cloud — the only hosted Elasticsearch offering to include all of the new features in this latest release.

Endpoint privilege management (Application Control) | ManageEngine PAM360

ManageEngine PAM360 is an enterprise-grade unified privileged access management solution that offers strict governance of privileged users, credentials, digital entities, and other shared sensitive information. In this video, we will help you configure ManageEngine PAM360's endpoint privilege management (Application Control) feature powered by ManageEngine Application Control Plus.