Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard

Old mobile numbers can compromise unsecure MFA systems

Multi-factor authentication (MFA) adds a layer of security to logins that is essential to prevent unwanted access. This verification process uses a second device (owned by the user) as an additional identity verification element to which a token is sent (or generated) that certifies access veracity. The most secure MFA systems use applications to generate temporary codes, but many still rely on sending text messages to mobile phones (OTP).

Wanted: Reward of up to $10 million for critical infrastructure hackers

The U.S. government aims to tackle cybercrime, in particular attacks targeting critical infrastructure. For this purpose, the U.S. State Department has announced a reward of up to $10 million to anyone who offers valid information about any potential cyberattacks on critical infrastructure supported by foreign states.

Deploying Zero-Trust Networks in the Era of COVID-19: A Guide for Service Providers

The coronavirus pandemic has exposed business continuity inadequacies at many organizations, and highlighted the slow pace of progress in digital transformation. This new reality necessitates a departure from a traditional network-centric security model that assumes every device and user within the network should be trusted.

A Security Umbrella From A Single Vendor

Equipping your team with the most holistic cybersecurity stack is just as important as protecting your clients with the latest and greatest security solutions. There are many factors to consider before deciding which option would best benefit your business. Hear from Success Computer Consulting to learn what they consider as they're deciding which vendors to partner with.

Celebrating 25 Years

WatchGuard is celebrating our 25th anniversary in 2021! From our early days in Seattle’s Pioneer Square to a team of more than 1,200 today, our outstanding employees and culture have fueled our success. WatchGuardians past and present have contributed their curiosity, humor, dedication, teamwork, and customer focus to building a cybersecurity platform that simplifies every aspect of security delivery. It’s been a fantastic journey! We’ve gathered photos from decades past and interviewed a wonderful group of our colleagues to create this look back on 25 years of our history. Thank you to employees, partners, and customers, both past and present. We wouldn’t have made it here without you!

Flexible Pricing to Address the Evolving MSP Business

As MSPs prepare for the shift to hybrid work environments, it is more important than ever to have the pricing and packaging model you and your customers need. The more options you have, the more competitive you can be in the market. It's critical that service providers find vendors the flexibility you need to scale your business.