Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Timeline of the Top 15 Cybersecurity Acronyms & Abbreviations

At WatchGuard, we’re all about security simplified. But living this mission becomes challenging when we’re constantly faced with a barrage of information technology (IT) acronym soup. Whenever I read the latest blog post or I hear the latest cybersecurity news, one of those dreaded acronyms inevitably appears. In IT, the acronyms are prolific.

Deciphering alphabet soup: IoCs and IoAs

Security Operations teams are the cornerstone of the fight against last-mile cybercrime in any organization. This is why they need the most advanced technologies possible.But the fight against cybercriminals isn’t simply a question of technology. Having a proactive attitude against possible cyberattacks is also key. This is where we see two essential concepts for all Security Operations teams: IoCs (indicators of compromise) and IoAs (indicators of attack). What is the difference?

The 443 Podcast - Episode 258 - The Qakbot Takedown

This week on the podcast, we cover the FBI-lead, multinational takedown of the Qakbot botnet of over 700,000 victim devices. After that, we cover two android malware variants including one targeting victims in southeast Asia and another built by the Russian GRU. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

WatchGuard Wins Cloud Computing Security Excellence Award

Today, we are delighted to share that WatchGuard has been named a winner in the Cloud Computing Magazine’s 2023 Cloud Computing Security Excellence Awards! This prestigious awards program recognizes companies that have most effectively leveraged Cloud computing in their efforts to bring new, differentiated offerings to the market.

Why RMM integrations are important for MSPs

IT environments have become increasingly complex in recent years. This can be attributed to factors such as distributed work environments applying hybrid work models, the increase in the number of devices, and the growing number of systems to be managed. This complexity makes it increasingly difficult to provide a good service to your customers effectively.

How to recognize real AI in cybersecurity?

The term artificial intelligence is used to describe an IT system’s simulation of human intelligence processes, such as the ability to adapt, solve problems or plan. Artificial intelligence systems cover several of these features at present and, with the advent of ChatGPT, their use has become widespread in everyday life. However, this has also resulted in organizations exploiting the term "artificial intelligence," seeking to capitalize on its appeal.

WatchGuard Honored in CRN's 2023 MES Midmarket 100

Today, we are thrilled to share that WatchGuard has again been honored as part of CRN’s MES Midmarket 100 list for 2023! CRN’s prestigious annual MES Midmarket 100 program recognizes forward-thinking vendors that serve midsize customers with products and services designed to address the midmarket's unique needs.

The 443 Podcast - Episode 257 - Weaponizing WinRAR

This week on the podcast we cover the latest evolutions of the North Korean threat actor Lazarus before covering an actively-exploited 0day vulnerability in the popular unarchiver WinRAR. We end the episode with an AI-related attack that doesn't actually use AI. You can view more information on the CISA guidance as well as Blaze Lab's full blog post at the links below: The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.