Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Forward Networks 22.5 Release adds external sources to provide a powerful data aggregation layer for comprehensive testing and integration.

We just released our 22.5 Release to Forward Enterprise and boy what a surprise to have our NQE external data sources finally ready to show the world. Very simply, this allows you to pull in data from external HTTP sources (currently we support HTTP GET) and automagically model the data in our data model explorer and our integrated development environment. To enable this you simply need to add the resource endpoints for the HTTP API of the data you are interested in. i.e.

Trust as an Attack Vector

Trust is one of the things that makes us human. We evolved the ability to trust in order to make life or death judgment calls and it is wired into our brains from birth. Unfortunately, since time immemorial, nefarious characters have always abused the trust of others to their own advantage, and in the modern world it is now one of the primary tools in a cybercriminal’s arsenal.

WatchGuard Wins Big at the 2022 IT World Awards with Six Honors

We are proud to announce that for the seventh year in a row, WatchGuard has been recognized at the IT World Awards for 2022, securing six wins across multiple categories. This prestigious awards program honors information technology and cybersecurity vendors with advanced, ground-breaking products, solutions and services that are helping set the bar higher for others in all areas of IT and security.

Microsoft Power Pages: Low-code Misconfiguration Remains a Top Security Risk

Last week Dark Reading released an enterprise application security survey which raised serious concerns by IT and security teams Last week, Microsoft announced a new low-code application service called Power Pages, the fifth service joining the Power Platform. Whether you’re a low-code maker or professional developer, this low-code, scalable, and secure solution empowers you to build business-centric websites quickly and easily.

CMMC & FedRAMP: FIPS Certified vs. Compliant vs. Validated

The Federal Information Processing Standard (FIPS) 140-3 (2019) is “applicable to all federal agencies that use cryptographic-based security systems… and shall be used in designing and implementing cryptographic modules that federal departments and agencies operate or are operated for them under contract.” In other words, any organization that stores, processes, or transmits certain government information must do so in a way that conforms to the FIPS standard.

How to Protect Your Emails: 8 Best Gmail Account Security Tips

Have you ever had your Gmail account hacked? If not, you’re lucky. But it happens, 1 out of 4200 emails sent in 2020 was a phishing activity. Considering that 306 billion emails were sent in the same year, it means a whopping 72 million were phishing-related. Keeping your Gmail secure isn’t a request anymore. You don’t want anyone to access your personal information or compromise important company conversations and files.

How To Send A Secure Email In Outlook

Sensitive data leaks are too common in the headlines these days, and there is no need to waste space explaining why it is essential to secure your sensitive information. Secure encryption is one such method to ensure your email messages are encrypted to be read-only by the intended recipients. Sending an encrypted email message is the need of the hour for business or professional practice and Outlook encryption is the best possible solution available in the market.

Best practices for implementing the 5 most challenging technologies in cybersecurity

Technology plays a fundamental role in the transformation process that companies have embraced in recent years. However, tech decision-makers have some reservations about adopting the latest technologies to avoid putting corporate security at risk. These are the findings of the Pulse survey of 150 technology leaders, in which 65% say they will avoid implementing AI, Hybrid Cloud, Edge Computing, 5G and Container Security because of the complexity required to implement them securely.