Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

BYOD and Phishing Attacks: Top Threats Facing U.S. Government Organizations

Telework has become a mainstay, and with it, so has employee reliance on personal mobile devices. These devices are difficult to monitor and keep up to date, presenting a unique security challenge for U.S. local, state, and federal government organizations.

Digital ID in NZ, Austria, & Japan- Why Online Identification Matters

Controlling information leakage is one of the top digital ID advantages for people’s privacy. It is also known as “selective disclosure,” and it is something that all digital ID adapters regard to be critical for user privacy. However, a closer examination reveals that such a system might result in a digital trail of where and when a license is displayed, possibly allowing governments or corporations to follow people or their transactions.

Complete Guide on Comodo Code Signing Certificate

Comodo is a cybersecurity solutions provider helping businesses and individuals stay protected from all sorts of cyber threats. It provides verdict processing, digital certificates, endpoint protection, helps organizations implement and monitor their network security policies, and much more. Among its digital certificates, Comodo also provides code signing certificates to developers and development companies.

4 Steps for Defining Data Classification Levels and Policies

Data classification is an important business process. It makes it easier to apply data protection, helps employees understand what data is sensitive, and, importantly, which data can be made public. Unfortunately, many organizations provide employees with access to far more data than is needed. The oversharing of information with employees is a huge security risk.

Synopsys Action introduces GitHub Actions integration for developers

GitHub Actions integrates AST capabilities into development workflows and CI/CD pipelines to provide instant, actionable insights into risks. Today, the nature of technology and its accelerated time to market require organizations to extend security practices to development and engineering teams.

Does cloud log management shield you from threats? CloudTrail vs CloudWatch

What is different about cloud log management versus on-premises? The answer may seem simple, but several elements such as CloudTrail vs. CloudWatch come into play. In this article, we will cover some of the most important differences, and then dig deeper into a specific example of AWS CloudTrail vs. CloudWatch.

6 Steps to Successful IR: Identification

In our last blog post, we discussed the importance of having a solid Incident Response plan in place. In this blog post, we will discuss the next step in that process: identification. Once you have determined that an incident has occurred, it is important to identify the scope of the issue as quickly as possible. This will help you determine the best course of action and ensure that your response is effective.

WatchGuard recognized at the 2022 TrustRadius Best Software List

We’re thrilled to share that WatchGuard has been recognized in the 2022 TrustRadius Best Software List! The first-ever TrustRadius Best Software List celebrates products that support the evolution of self-serve buyers by sourcing and using customer reviews. To make the list, products must have 40+ reviews from the past year and have maintained a trScore of 7.5 or higher. These characteristics demonstrate a commitment to transparency, improvement, and user insights.

CVE-2022-3602 and CVE-2022-3786 - OpenSSL 3.0.X Critical Vulnerabilities

On October 25, 2022, the OpenSSL project announced the existence of a critical vulnerability in the OpenSSL library affecting OpenSSL versions 3.0.0 and above, as well as any application with an embedded, impacted OpenSSL library. This announcement did not include any details on what this vulnerability is or how it can be exploited. On November 1, 2022, a cryptographic library used for encrypting communications in a wide variety of applications on the internet.