Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Uncovering the scraper bots plaguing APIs

Most cyber threats — like credential stuffing and card cracking — are committed by fraudsters with the aim of stealing money, data, or both. The law is clear on these cyberattacks: online fraud is illegal. But unlike these overtly malicious threats, web scraping isn’t always illegal, or even unethical. Aggregator sites like travel agencies and price comparison websites use scraper bots to help customers find the best deals.

Security Benefits of Identity and Access Management (IAM)

Identity and Access Management or Identity Access Management (IAM) is a critical security function for organizations of all sizes for privileged access management. By managing access to systems and data, IAM can help mitigate the risk of information breaches and protect the organization's most valuable assets through IAM technologies.

Why the Right Architecture is the Cornerstone of Cloud Security

Alan Hannan is a member of the Netskope Network Visionaries advisory group. The cloud often seems like a black box for many corporate networking and security professionals. They have expertise in optimizing their internal network. Still, once they offload their traffic to the cloud, they figure they’re handing off optimization to the software-as-a-service (SaaS) provider.

The Top Cyber Attacks of July 2022

It was an exceptionally hot July in many parts of the world, and cyberspace was no exception. High profile hacks in July affected people in all walks of life, from casual gamers and social media posters to air travelers and medical patients. Still, we hate to be the bearers of exclusively bad news, so we’ve included one silver lining amongst our usual bank of dark clouds.

Top 8 Network Segmentation Best Practices in 2022

As businesses and organizations scale and grow, their network infrastructure can also grow increasingly large and complex. Using a flat network structure (all devices connected on one server) makes it easier for cybercriminals to roam freely and unimpeded in the system in the event of a successful cyber attack. Implementing network segmentation best practices can limit the scope of an attack, prevent malware from spreading, and disrupt lateral movements across your IT ecosystem.

Automated Cybersecurity for Converged IT/OT/ICS Manufacturing Environments

For decades, IT and operational technology/industrial control systems (OT/ICS) were seen as separate entities within organizations. In keeping with practices first defined by the Purdue Enterprise Reference Architecture, the two systems were entirely air gapped to never impact one another. While this separation kept OT networks more protected, it is no longer practical.

WatchGuard Recognized at ChannelPro Network's 2022 Reader's Choice Awards

We are thrilled to share that WatchGuard has secured Bronze in the “Best Network Security Vendor” category at this year’s ChannelPro Network Reader’s Choice Awards! This annual awards program is the IT channel’s only SMB-focused Reader’s Choice Awards by casting their votes for the vendors, distributors and professional organizations with the most SMB- and partner-friendly solutions in the channel today.