Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard

The 443 Podcast - Episode 259 - iPhone's Latest 0-Day

This week on the podcast, we cover Microsoft's final report on their July incident involving nation-state actors compromising enterprise email accounts. After that, we discuss a zero-day, zero-click vulnerability in iOS being actively exploited in the wild before ending with a chat about an upcoming change to how Android handles CA certificates. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

How MSPs are Improving Business Models with Unified Security Services

Historically, MSPs have offered a broad portfolio of outsourced IT products and services, but not cybersecurity. Demand for security services from companies of all types and sizes is rising significantly now due to the steady rise in cyberattacks. According to a recent survey, 52% of MSPs state that cybersecurity is the most requested offering by customers. Adding security services to their portfolios gives MSPs the opportunity to reinvent themselves and access a broader customer base.

A Timeline of the Top 15 Cybersecurity Acronyms & Abbreviations

At WatchGuard, we’re all about security simplified. But living this mission becomes challenging when we’re constantly faced with a barrage of information technology (IT) acronym soup. Whenever I read the latest blog post or I hear the latest cybersecurity news, one of those dreaded acronyms inevitably appears. In IT, the acronyms are prolific.

Deciphering alphabet soup: IoCs and IoAs

Security Operations teams are the cornerstone of the fight against last-mile cybercrime in any organization. This is why they need the most advanced technologies possible.But the fight against cybercriminals isn’t simply a question of technology. Having a proactive attitude against possible cyberattacks is also key. This is where we see two essential concepts for all Security Operations teams: IoCs (indicators of compromise) and IoAs (indicators of attack). What is the difference?

The 443 Podcast - Episode 258 - The Qakbot Takedown

This week on the podcast, we cover the FBI-lead, multinational takedown of the Qakbot botnet of over 700,000 victim devices. After that, we cover two android malware variants including one targeting victims in southeast Asia and another built by the Russian GRU. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

WatchGuard Wins Cloud Computing Security Excellence Award

Today, we are delighted to share that WatchGuard has been named a winner in the Cloud Computing Magazine’s 2023 Cloud Computing Security Excellence Awards! This prestigious awards program recognizes companies that have most effectively leveraged Cloud computing in their efforts to bring new, differentiated offerings to the market.

Why RMM integrations are important for MSPs

IT environments have become increasingly complex in recent years. This can be attributed to factors such as distributed work environments applying hybrid work models, the increase in the number of devices, and the growing number of systems to be managed. This complexity makes it increasingly difficult to provide a good service to your customers effectively.

How to recognize real AI in cybersecurity?

The term artificial intelligence is used to describe an IT system’s simulation of human intelligence processes, such as the ability to adapt, solve problems or plan. Artificial intelligence systems cover several of these features at present and, with the advent of ChatGPT, their use has become widespread in everyday life. However, this has also resulted in organizations exploiting the term "artificial intelligence," seeking to capitalize on its appeal.