Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard

WatchGuard Joins Data Privacy Framework Program

Our customers benefit from streamlined transactions as WatchGuard has joined the EU-U.S. Data Privacy Framework (DPF), the UK Extension to the EU-U.S. DPF, and the Swiss-U.S. DPF. This allows our European Economic Area (EEA) and UK customers to freely transfer personal data to WatchGuard in the U.S.

The 443 Podcast - Episode 266 - The Threat Actor That Hacked MGM

This week on the podcast, we review a thorough unmasking of Octa Tempest, the threat actor beind the MGM and Caesars Entertainment attacks in September. Before that, we give an update on the Cisco IOS XE vulnerability that head to an implant installed on thousands of exposed devices. We round out the episode with an analysis of CitrixBleed, an information disclosure vulnerability in Citrix NetScaler that was just patched last week.

Strengthening Security: The Power of Multiple Layers Against Advanced Threats

It's no secret that news of cyberattacks and data breaches that cause significant damage are becoming increasingly frequent in cybersecurity. Malicious actors are also constantly coming up with new threats, such as zero day attacks that are designed to avoid detection and bypass traditional security measures. It's crucial to take a comprehensive and global stance on this issue, rather than relying on a single security layer.

6 reasons why your company needs a firewall

The growing network perimeter is a fact of life. Attacks on corporate networks can take many forms, such as viruses, backdoors, denial of service (DoS) attacks, macros, remote logins, phishing emails, social engineering, and spam. In this evolving threat landscape, firewalls continue to play a key role in securing our networks and devices.

WatchGuard Launches MDR Service, Helps MSPs Accelerate Cybersecurity Service Delivery

Amid rising customer demand for MDR, the new offering allows MSPs to offer 24/7 threat detection and response services to customers without the burden of building and managing an in-house SOC.

Cybersecurity Power Plays: Product Pairings for Stronger Security

In sports, the most successful teams master the art of strategic combinations. The same is true within the cybersecurity arena. In today’s expanding and complex threat landscape, trying to beat cyber opponents with a starting lineup of disparate point solutions is a losing strategy. How much better would your cyber defenses be with correlated threat intelligence across each of your key security solutions?

The 443 Podcast - Episode 265 - CISA's Secure by Design Whitepaper

This week on the podcast, we cover CISA's newly updated whitepaper on guidance for both software manufacturers and customers on the principals of secure-by-design and secure-by-default. Before that, we cover the Cisco IOS XE vulnerability that is under active exploitation in the wild, give an update on the EPA's efforts to regulate cybersecurity practices in water districts, and then discuss research into the latest "bullet proof hosting" options for malicious web content.