Endpoint Security

How to avoid Credential Abuse

With malicious use of credentials responsible for over 80% of breaches worldwide, how can you prevent your credentials being compromised

4 Differences Between Threat Hunting vs. Threat Detection

Companies are becoming aware of the importance of building threat detection and hunting capabilities that avoid putting their businesses at risk. But sometimes we confuse these two concepts so in this article we have listed the main differences between them.

Breaking the Cyber Kill Chain

With more remote devices connected to the corporate network, Corey Nachreiner, CTO of WatchGuard looks at the importance of endpoint security in the cyber kill chain .

Is EMOTET gone forever?

While the takedown of the EMOTET botnet was successful, Corey Nachreiner, CTO at WatchGuard Technologies, says that malware has a habit of resurfacing and provides some advice on how to be prepared.