Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

No summer scares: 5 tips on how to keep your business cybersecure

Guiding employees' digital behaviors is key to avoiding potential cybersecurity breaches. However, remote work during summer weeks may disrupt normal routines and change the location of digital assets, leaving companies open to vulnerabilities. According to our latest Internet Security Report, malware detections on endpoints increased by more than 75% during the first months of the year.

The Challenges of Full Network Visibility and How a Network Digital Twin Can Help

In today’s complex IT environments, maintaining full network visibility is a daunting task. Network segmentation, while essential for security, often complicates the process of obtaining a comprehensive view of the entire network infrastructure. Federal IT departments charged with the responsibility of keeping networks mission-ready, face significant hurdles in visualizing connectivity, ensuring security zone segmentation, and performing complete path searches across segmented domains.

CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

Watching the recent Snowflake customer attacks unfold felt a bit like rewatching a horror movie with predictable attack sequences and missed opportunities to run to safety. But this time, the ending was far more devasting. More than 100 organizations were exposed, and many are now grappling with the impacts of data theft and extortion in what some are calling one of the largest breaches in history.

Crypto Exchange Bybit Integrates Fireblocks Off Exchange

Fireblocks Off Exchange enables businesses across the world to trade on centralized exchanges without introducing counterparty risk. Today, we’re proud to share that Bybit is the newest exchange to integrate with Off Exchange. Bybit, a crypto exchange ranked the second-largest in the world, joins Deribit, with further integrations to follow. These include BIT, Bitget, Coinhako, Gate.io, One Trading, and OKX.

NEW! PHP 8.3 support, Online Licensing tools and 25% off at ioncube.com

Our latest ionCube Loader update supports the running of PHP 8.2 files (encoded with ionCube Encoder 13) on PHP 8.3 machines! ionCube Loaders are extra special in that we are sometimes able to offer extended compatibility allowing existing encoded files to run on future versions of PHP. With PHP 8.2 encoded files you are now able to run them on PHP 8.3 even if they were encoded before this new Loader version was released.

WatchGuard Wins 2024 ChannelVision Visionary Spotlight Award

We’re excited to share that ChannelVision Magazine has recognized WatchGuard Technologies with a 2024 Visionary Spotlight Award for Cybersecurity in the program’s Business Technology category! The annual award program honors top industry players that have significantly advanced their channel and technological investments over the last year.

6 Steps on How to Respond to a Data Breach Before it Ruins Your Business

Too many consumers have awoken one morning to find messages from a retailer or their bank detailing purchases made through their account of which they were unaware. While the realization that they have been hacked will cause some well-deserved panic for the account holder, it usually only takes a few phone calls to cancel purchases, change a password, and cancel a credit card to put a stop to the problem.

Australian Cyber Security Strategy for Hardening

Australia aims to be the world leader in cyber security by 2030 using the Australian Cyber Security Strategy that was released on 22 November 2023. With the cost of cybercrime on Australian businesses growing by up to 14% per annum, the Cyber Security Strategy seeks to improve cyber security, manage cyber risks and better support citizens and Australian businesses to manage their cyber environment by using six cyber shields and actions to be taken.

Why the World's Top MSSPs are Ditching Legacy SOAR for Hyperautomation

Managed Security Service Providers (MSSPs), desperate to automate repetitive tasks, initially turned to SOAR to reduce their workload and improve threat response times. Unfortunately, legacy SOAR tools still face scalability, flexibility, and integration challenges. As the complexity and volume of cyber threats continue to grow, the limitations of legacy SOAR have become more apparent, necessitating the move towards more advanced automation technologies like Torq Hyperautomation.

Safeguarding Your Collaboration Tools: Tackling the New Favorite Targets of Attackers

Secrets in collaboration tools are becoming prime targets for attackers. Reduce your attack surface by extending GitGuardian automated secrets detection capabilities to Slack, Jira, Confluence, or Microsoft Teams. Ensure security wherever your teams collaborate!