Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Making Content Security Policies (CSPs) easy with Page Shield

Modern web applications are complex, often loading JavaScript libraries from tens of different sources and submitting data to just as many. This leads to a vast attack surface area and many attack types that hackers may leverage to target the user browser directly. Magecart, a category of supply chain attack, is a good example.

Cybercrime Never Takes a Vacation. Cybersecurity in the Hospitality Industry

The Trustwave SpiderLabs team conducted a multi-month investigation into the cyber threats facing the hospitality industry worldwide and has released a detailed report displaying how threat actors conduct attacks, the methodologies used, and what organizations can do to protect themselves from specific types of attacks.

International Identity Day: an opportunity to pause and reflect

This blog is different from the ones you typically see from WatchGuard. It is because we are joining in the conversation about International Identity Day, which takes place on September 16, 2023. International ID Day is a movement to raise awareness and address the lack of identity, specifically the growing need for digital identities, as a fundamental right of people worldwide.

Ekran System Announces Integration with Venn to Enhance Remote Work Security

Ekran System announces its partnership with Venn, a provider of innovative solutions that secure remote work on any unmanaged or BYOD computer. Like Ekran System, Venn is recognized by many cybersecurity experts. It has also been named a Sample Vendor by Gartner. We hope this strategic partnership will mark a significant advancement in fortifying remote work environments against emerging cybersecurity threats.

Three Recent Examples of Why You Need to Know How Vulnerable Your Secrets Are

In today's digital landscape, the issue of compromised credentials has become a major concern. Discover how renowned companies like Microsoft, VMware, and Sourcegraph were recently confronted with the threats of secrets sprawling.

Black Hat NOC USA 2023: A tale of sharp needles in a stack of dull needles

During Black Hat 2023 in Las Vegas, our Corelight team worked effectively and speedily with our first-rate Black Hat NOC partners Arista, Cisco, Lumen, NetWitness and Palo Alto Networks. I was fortunate enough to be a member of the NOC team at the show, helping to defend the Black Hat network. In this blog, I’ll share my experience within the Network Operations Center (NOC) as well as an incident that we detected, investigated, triaged, and closed using Corelight’s Open NDR Platform.

Cloud Threats Memo: Mitigating the Risk of Third-party Apps

The use of third-party apps (also known as “connected apps”, “cloud to cloud apps”, “OAuth apps”) are apps developed by external and internal developers or organizations that can interact with and extend the functionality of a primary SaaS App. These are growing exponentially across organizations.

5 Steps to Performing a Cybersecurity Risk Assessment

There’s no such thing as one-size-fits-all cybersecurity. Every organization faces a unique set of security risks, and needs to take its own unique approach to cybersecurity risk assessment. Unfortunately, however, cybersecurity risk assessments aren’t easy to undertake, and getting started can be the most challenging part of your risk management strategy. To help, we’ll take you through the process step by step.

What is Calculated Risk in Business?

Every business decision involves an element of risk. Management’s job is to assess that level of risk as best as possible, and to weigh that risk correctly against the potential rewards. That risk-versus-reward equation is the basis for taking calculated risks, often referred to as your “risk-adjusted return on investment.” So how should an executive team approach this process?

Exploring the ePrivacy Directive

There are a variety of cybersecurity regulations in Europe, including the ePrivacy Directive, which focuses on enhancing data protection, processing personal data, and privacy in the digital age. This Directive, recently updated with the ePrivacy regulation, continues the European Union’s ongoing efforts to create cohesive and comprehensive European data protection and cybersecurity standards across all member states.