Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Kubernetes security multidimensional single pane of glass experience

One of the most used buzzwords in our industry is "single pane of glass". But what does it really mean? In most cases, it means a single dimension – either cross-infrastructure or cross-functionality or cross-organization. It usually never AND. Most likely, it's OR. So you will need to use multiple single-pane-of-glass products This led to an interesting discussion between us. Is it a single-pane for all the K8s clusters? Or single-pane for all the K8s security capabilities/functionalities?

BIG-IP iControl REST Critical Authentication Bypass Vulnerability - CVE-2022-1388

On Wednesday, May 4, 2022, F5 disclosed a critical-severity vulnerability impacting the iControl REST authentication of BIG-IP systems being tracked as CVE-2022-1388. If successfully exploited, the vulnerability could lead to Authentication Bypass, which could allow a threat actor to execute arbitrary system commands, perform file actions, and disable services on BIG-IP. BIG-IQ Centralized Management, F5OS-A, F5OS-C, and Traffic SDC are not impacted by CVE-2022-1388.

The 'State of Mental Health in Cybersecurity: 2022' report

When it comes to security teams, many people may assume that these specialists have some natural ability or extra mental strength for dealing with challenges. After all, these individuals are responsible for preventing cyberattacks and dealing with catastrophic incidents when they occur; they must always be on and ready.

Detect infrastructure drift and unmanaged resources with Snyk IaC

As a developer, you’re probably using some infrastructure cloud provider. And chances are, you automate parts of your infrastructure using infrastructure as code (IaC), so deployments are repeatable, consistent, easily deployable, and overall, more secure because code makes parameters more visible.

How Do You Get Infected by Ransomware?

Over the last few years, the rate of cyberattacks has continued to hit record growth, taking advantage of individuals or businesses with poor cybersecurity practices. These attacks have affected healthcare, government, finance, and major businesses around the world. Of these cyberattacks, ransomware consistently ranks at the top of the most common cyber threats list, with an estimated 623 million incidents worldwide in 2021.

5 Ways Automated Incident Response Reduces Toil

Toil — endless, exhausting work that yields little value in DevOps and site reliability engineering (SRE) — is the scourge of security engineers everywhere. You end up with mountains of toil if you rely on manual effort to maintain cloud security. Your engineers spend a lot of time doing mundane jobs that don’t actually move the needle. Toil is detrimental to team morale because most technicians will become bored if they spend their days repeatedly solving the same problems.

Shell Evasion: An Insider Threat

Cybersecurity strategies within cloud environments are often seen as a complicated landscape with rapidly developing technologies, architectures, and terms. Simultaneously, there are continuously motivated individuals and groups trying to utilize vulnerabilities for illicit uses such as to increase access to the data, install malware, disrupt services, and more.

WatchGuard Honored in the 2022 Globee Sales, Marketing, Customer Success, and Operations Awards

We are honored to announce that WatchGuard was named a Grand Globee Winner at the 2022 Globee Sales, Marketing, Customer Success, and Operations Awards! This annual awards program honors industry-wide individuals and teams that create great experiences for their customers. WatchGuard was recognized for its philosophy of technician enablement and continued upgrades to processes and applications to make the team even more effective in assisting customers.

Building a Strong Business Case for Security and Compliance

Compliance is a key part of any organisation and in business terms, it is about ensuring companies of all sizes and their employees comply with existing national and international laws. In the UK the Companies Act 2006 is the main legislation that forms the primary source of company law and businesses of all sizes must ensure they adhere to it to remain compliant.