Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep 26: You can patch your code, you can't patch burnout

In this episode of Masters of Data, we tackle why cybersecurity professionals burn out, and it's not just long hours. We explore how repetitive tasks, limited growth, and work that feels invisible drain security teams who face constant vigilance with few wins and no finish line. We discuss how high-stakes environments and rigid SLAs prevent real breaks, then share solutions: celebrate small victories, recognize contributions, prioritize physical health, and protect work-life balance. The key? Clear communication, realistic expectations, and making security's invisible impact visible.

Scale compliance across global frameworks with Datadog Cloud Security

Security organizations are expected to keep pace with a growing set of regulatory and industry requirements as their cloud environments grow. Yet maintaining compliance in modern, fast-moving infrastructure is increasingly difficult. Cloud resources change by the minute, teams adopt new services without centralized oversight, and evidence needed for audits is often scattered across tools and providers.

The New 2026 China Cybersecurity Law Podcast

A new Chinese cybersecurity law just changed the global threat landscape. In this clip, Tova Dvorin and Adrian Culley break down what went into effect on January 20, 2026—and why it’s unprecedented. Under the updated law, vulnerabilities discovered by Chinese citizens or companies must be reported to the state within 48 hours and cannot be disclosed to vendors until approved. The result? A government-first window to exploit zero-days before they’re patched—at global scale.

Switch from SonicWall and Succeed

If you use SonicWall, you know what type of year 2025 was for your business. Between breaches, price increases, and confusing pivots, your vendor left you to clean up their mess while you paid more for their product and earned less in return. Join Adam Winston, Field CTO at WatchGuard Technologies, to learn why our Unified Security Platform is the right choice for a profitable, worry-free 2026. In this session, we’ll discuss.

Uncovering A Mass VPN Phishing Campaign - The 443 Podcast - Episode 355

This week on the podcast, we cover some first-hand research from the WatchGuard Threat Lab on a phishing campaign targeting users of nearly every major VPN vendor. After that, we discuss two recently resolved vulnerabilities in the Fortinet FortiSIEM application, then end with research from Varonis on a new attack flow against Copilot called RePrompt.

Decoding MITRE ER7: How to Interpret Results That Matter

MITRE ATT&CK Evaluations attract strong attention across the cybersecurity industry by providing detailed, transparent data on how endpoint security solutions behave under real attack conditions. However, the depth of the results often makes them difficult to interpret and compare meaningfully. Join Field CTO Adam Winston as he decodes WatchGuard’s MITRE ER7 results and learn how to weigh key metrics to determine real-world security effectiveness and efficiency.

The Philanthropist's Take: Bolstering Cyber Civil Defense

“Doing well by doing good” – there’s something to be said for that. Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Craig Newmark (Founder, craigslist, Craig Newmark Philanthropies) for this discussion on: SecurityScorecard monitors and scores over 12 million companies worldwide. Find your company's security score for free at SecurityScorecard.com Follow our CEO Dr. Aleksandr Yampolskiy.

Custom Risk Scoring Is the Missing Link Between Disconnected Findings and Real Exposure Management

Most large organizations rely on multiple vulnerability and exposure scanning tools out of necessity. Infrastructure scanners, cloud security platforms, application security testing tools, container scanners, and attack surface management solutions all play a role. Each one is designed to answer a specific question. But when it comes to understanding the risk of the vulnerabilities and exposures they detect, each tool has its own approach to quantifying it.

How to Align Your DevSecOps Framework with Software Supply Chain Security

A strong DevSecOps framework integrates security into every stage of the software development lifecycle (SDLC). But as development accelerates, reliance on third-party and open-source code grows, introducing significant risks from the software supply chain. Aligning your DevSecOps framework to address these specific threats is no longer optional. It’s essential for building resilient and secure applications.

The New ionCube Forum - A place for ionCube users to help eachother out and discuss all things ionCube

Change is coming Some people don’t like change. Change is inevitable. And sometimes, change can be a good thing too. A while back we took our old phpBB2 forum offline (Find out why – here). As expected, that decision prompted a range of reactions and some understandable concerns from members of the community. The reasons behind that choice, including why we knew it would not work for everyone, are set out in the original post and remain unchanged.