Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Federal and Local Government Agencies Continue to Use Section 889 Prohibited Products

Section 889 of the John S. McCain National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2019 prohibits the procurement or use of Huawei, ZTE, Hytera, Hikvision, or Dahua telecommunication and video surveillance products and services by federal agencies, government contractors, and the recipients of any federal grants or loans (this latter category includes many state and local governments).

Open Port Vulnerabilities List

Insufficiently protected open ports can put your IT environment at serious risk. Threat actors often seek to exploit open ports and their applications through spoofing, credential sniffing and other techniques. For example, in 2017, cybercriminals spread WannaCry ransomware by exploiting an SMB vulnerability on port 445. Other examples include the ongoing campaigns targeting Microsoft’s Remote Desktop Protocol (RDP) service running on port 3389.

Securing PHP containers

According to Wappalyzer, PHP powers over twelve million websites. Not bad for a 28-year-old language! Despite its age, PHP has kept up with modern development practices. With support for type declarations and excellent frameworks like Laravel and Symfony, PHP is still a great way to develop web apps. PHP works well in containerized environments. With an official image available on Docker Hub, developers know they can access well-tested PHP container images to build on.

A definitive guide to Ruby gems dependency management

Ruby, much like other programming languages, has an entire ecosystem of third-party open source libraries which it refers to as gems, or sometimes Ruby gems. These gems are authored by the community, and are available from RubyGems.org which is the official registry for Ruby libraries. Similarly to other open source ecosystems, threat actors may publish deliberate malicious code or such which includes backdoors or credentials harvesting.

The power of XDR - Stay ahead of the curve - Presentation

At this year’s InfoSec conference hosted by Computer 2000, LogSentinel presented – “The power of XDR-stay ahead of the curve” Asen Kehayov CEO and Nikolay Raychev CTO presented in depth the XDR trend in cybersecurity and how LogSentinel SIEM accommodates conceptual architecture and improves the industry vision of XDR.

How Colleges & Universities Can Prevent Ransomware Attacks

In recent years, there has been increasing amounts of ransomware attacks on colleges and universities due to poor cybersecurity practices, a higher likelihood of ransom payment, and the value of information involved. The entire education sector performs poorly as a whole compared to other sectors when it comes to data security, and hackers are quickly taking notice.

WatchGuard in CRN's 2022 Top 100 Executives List

For the fourth consecutive year, CRN has named WatchGuard CEO Prakash Panjwani a Top 25 IT Innovator in its 2022 Top 100 Executives list. This elite awards program recognizes forward-thinking and innovative technology leaders who have proven their commitment and dedication to the channel through solution-provider-focused strategies and a willingness to take bold steps despite market unpredictability.

Top trends in Application Security in 2022

The rising number of cyber attacks against software applications has emphasized how security must serve as an important factor in software development. More than the traditional Software Development Lifecycle (SDLC) procedures, now security-integrated development lifecycles are being widely adapted. These aren’t the typical security assessments that are performed at the very end of development of the application, but embedded throughout the lifecycle.

Using Business Analytics for Risk Performance Management

Risk management is the process of identifying, evaluating, and controlling risks to an organization’s operations and financial performance. These dangers can be caused by several things, such as economic unpredictability, legal responsibilities, technological problems, strategic management blunders, accidents, and natural calamities. An effective risk management program helps a business navigate all potential hazards.

All You Wanted to Know About Data Security Fabric

Data is one of the most valuable assets for modern organizations. The right type and quality of data allows companies to resolve problems and improve business performance; it guides enterprise decision-making and drives business strategy. Data is also vital to improve cybersecurity, maintain regulatory compliance, and strengthen the competitive posture. In short, data matters. Organizations must protect their data assets from unauthorized access, compromise, and theft.