Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Elevating DevSecOps: JFrog and GitHub's Unified Platform Experience Deepens

Developers are expected to write new and more complex code to create leading-edge features in new software releases at a relenting pace. To do this they are looking for help from AI assistants like GitHub Copilot to help write better code, faster. They want to write, debug, and secure their code simultaneously, driving the need for leading-edge products like Copilot Autofix.

What's New with the TSA's Oil and Gas Security Directives?

In recent years, the security of the United States' critical infrastructure has become a pressing concern, particularly in the oil and gas sector, due to its pivotal role in the nation's economy and energy supply. Recognizing this, the Transportation Security Administration (TSA) implements several new directives in July each year aimed at enhancing the security and resilience of vital energy infrastructure against various threats, including cyber-attacks and physical disruptions.

Safeguarding Generative AI: How AI Guardrails Mitigate Key Risks

The growing reliance on generative AI is transforming industries across the globe. From automating tasks to improving decision-making, the potential of these systems is vast. However, with this progress comes significant risks. Generative AI can be unpredictable, creating new vulnerabilities that expose organizations to data privacy breaches, compliance failures, and other security issues. So, how can companies harness the power of AI while ensuring they remain protected?

Global age verification laws: how to maintain compliance and keep friction low

New age verification laws are popping up around the world. Learn what these laws are and how to stay compliant. Kerwell is a product marketing manager focused on Persona’s identity verification solutions. He enjoys watching basketball and exploring the world with his German Shepherd. Kerwell is a product marketing manager focused on Persona’s identity verification solutions. He enjoys watching basketball and exploring the world with his German Shepherd.

Celebrating our recent win in the 2025 TrustRadius Buyer's Choice!

We’re thrilled to announce that we’ve been honored with the prestigious 2025 TrustRadius Buyer's Choice! This recognition is a testament to the hard work and dedication of WatchGuard’s team and validates our focus on product innovation and ongoing commitment to simplifying security for partners and customers.

5 things to look for When choosing an XDR Solution

With the rise of data breaches and hacking attempts, a strong cybersecurity posture is the most significant need today. Given the scale of cybercrime growth, you need to carefully consider several key factors that will ultimately impact the cybersecurity solution you pick. Businesses have realized the value of their data; now they must invest in tools to easily detect and respond to security issues.

Best Practices for Continuous Vulnerability Management

Continuous vulnerability management is not just a best practice—it's a necessity. With so many open-source dependencies to choose from (almost 3 million on the npm registry!), it’s no wonder supply chain security incidents are the focus of malicious actors. Let’s not forget the rise of ChatGPT, LLM chatbots, and AI-assisted code generation.

How to build resilience in critical systems

From power grids and water systems to transport networks and healthcare facilities, critical infrastructure has become a key target for cyber attacks in recent years, such as US utilities suffering a 70% year-on-year increase in cyber attacks this year. The reason for targeting critical infrastructure is clear: they often use outdated software and the attacks have an outsized disruptive impact.

The Essential Guide to Vulnerability Management Tools

Vulnerability management programs attempt to identify and correct software vulnerabilities before they pose a significant threat to an organization’s cybersecurity. To learn more about how to design and implement a vulnerability management program, check out these resources: This article describes the tools that an organization will need to implement an effective vulnerability management program.