Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Endpoint Security

The 443 Security Simplified Podcast - Episode 196: Building Security Strategies with Matt Lee

In this special video edition of The 443 Security Simplified, we sit down for a chat with Matt Lee, Sr. Director of Security and Compliance at Pax8 and well-known cyber security educator, to discuss security strategies for MSPs and midsize enterprises in the face of a dynamic threat landscape. We cover everything from picking a framework to getting buy in from stakeholders and take a forward look at what future cyber regulations may look like to all organizations.

What cybersecurity challenges do SOCs face in the coming months?

A security operations center (SOC) is the centralized security team that deploys the tools needed to continuously monitor and improve an organization's security approach while also preventing, detecting, analyzing and responding to security alerts. You could say the SOC acts as the central command of an organization's security, bringing together its entire IT infrastructure, including its networks, devices and company data, both inside the corporate perimeter and outside.

Webinar: Outsourced Cybersecurity or In-House? How to Choose the Best Approach for Your Organization

The coronavirus pandemic created new challenges for businesses as they adapt to an operating model in which working from home has become the ‘new normal. In addition, threat actors constantly change their strategies, tools, and techniques. When their attacks become less effective, they look for new weaknesses to expose and move to.

Cybersecurity in education, key for 1 out of 10 partners

A few weeks ago, we reported how the new wave of phishing that uses new variants of COVID-19 as bait had hit the education sector hard. Many students at universities and colleges across the United States were victims of phishing attacks via emails pretending to be from administrators at their institutions.

7 warning signs indicating you need to change your endpoint security solution

Nowadays, there is a wide range of solutions on the market that claim to safeguard the security of corporate computers and networks. Benefits such as protection against sophisticated malware attacks, good performance when running processes, usability or quality technical support should be the norm, but this is not always the case.