Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Ensure PII Compliance in India with OpenAI & Top LLMs

India's data protection laws are evolving to safeguard the privacy of its citizens. One crucial aspect is the requirement that Personally Identifiable Information (PII) remain within India's borders for processing. This data residency requirement poses a challenge for businesses that want to leverage powerful AI language models (LLMs) like those offered by OpenAI, which often process data in global centers.

What is a DNS firewall? Optimize the security of your network infrastructure using DDI Central's DNS firewall

Cyberthreats in today’s digital age are becoming complex and relentless, highlighting the importance of robust cybersecurity measures. Among these measures, DNS firewalls stand out as essential components of a comprehensive security strategy. By intercepting and analyzing DNS traffic, these firewalls provide a unique vantage point for identifying and neutralizing threats before they can infiltrate the network.

How a Private Cloud Approach to SASE Helped Reduce Disruption From a Severed Sub-sea Cable

It feels like sub-sea cable disruptions are becoming ever more common, with recent reports of major outages caused by severed cables in the Mediterranean, the Red Sea, the North Sea, and—most recently—off the coast of Africa.

Kerberos v5 Authentication

Kerberos stands as the default authentication protocol facilitating secure service requests between trusted devices within a network. It has been an integral component of Windows Active Directory (AD) environments since the era of Windows 2000. When a user logs into their computer, Kerberos undertakes mutual authentication, ensuring both the user and the server validate their identities.

Does a VPN Protect You From Hackers?

While VPNs may protect you from some types of cyber attacks launched by hackers, they don’t protect you from all of them. For example, VPNs may protect you from Man-in-the-Middle (MITM) attacks, remote hacking, Distributed Denial-of-Service (DDoS) attacks and session hijacking, but VPNs will not protect you from hackers who steal encryption keys, or from account compromise, phishing attacks or illegitimate websites.

Winning the 10G Race with Cato

The rapidly evolving technology and digital transformation landscape has ushered in increased requirements for high-speed connectivity to accommodate high-bandwidth application and service demands. Numerous use cases, such as streaming media, internet gaming, complex data analytics, and real-time collaboration, require we go beyond today’s connectivity trends to define new ones.

Why Offensive Security is a Necessity for a Dynamic Threat Landscape

Today's ever-shifting threat landscape demands a multi-pronged approach to cybersecurity. Organizations must go beyond mere compliance by employing a combination of offensive security tactics and frequent testing. This empowers them to effectively manage organizational exposure and protect critical assets from evolving threats such as ransomware.

CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils

On March 29th, 2024, a backdoor in a popular package called XZ Utils was announced on the Openwall mailing list. This utility includes a library called liblzma which is used by SSHD, a critical part of the Internet infrastructure used for remote access. When loaded, the CVE-2024-3094 affects the authentication of SSHD potentially allowing intruders access regardless of the method.

WatchGuard Earns 8th Consecutive 5-Star Rating in CRN's 2024 Partner Program Guide

CRN has once again honored WatchGuard with a prestigious 5-star rating in its annual Partner Program Guide! The 2024 recognition marks the 8th consecutive year that the WatchGuardONE partner program has earned top marks in CRN’s definitive directory of the most rewarding partner programs for the IT channel.