Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

WatchGuard Wins Two Fortress Cyber Security Awards

We’re thrilled to share that Business Intelligence Group has named WatchGuard as a winner in the Organizational Excellence category and recognized WatchGuard CEO Prakash Panjwani with a prestigious Leadership Award at this year’s Fortress Cyber Security Awards! This annual program recognizes the top companies, executives, and products from around the world leading the charge in preparing, defending and responding to growing cybersecurity threats.

Coffee Talk with SURGe: the Interview Series featuring Scott Roberts

Join Mick Baccio and special guest Scott Roberts, head of threat research at Interpres Security for an interview about Scott's career journey, how he's seen cybersecurity evolve over time, and his essay featured in the SURGe team's new book, Bluenomicon: The Network Defender’s Compendium.

Streamline Co-editing Microsoft Documents with Egnyte

As part of our ongoing commitment to providing a seamless co-editing experience to Egnyte users, we have introduced new enhancements that enable Windows and Mac users to open any Microsoft Office-supported file such as Word, Excel, and PowerPoint, and start or join a co-editing session directly from the Microsoft Office App. Users can also co-edit in real time using the Egnyte Desktop, Online or Mobile versions.

Sysdig Enriched Process Trees, an Innovative Approach to Threat Detection

Discover how Sysdig Secure’s new Process Tree feature improves threat investigation. In order to speed up the investigation of security events, Sysdig Secure now includes a process tree showing the attack journey from user to process, including process lineage, container and host information, malicious user details, and impact. In Linux systems, a process tree refers to the hierarchical representation of running processes on a system. It depicts the parent-child relationship between processes all the way to the root.

Responding Instantly to Kubernetes Threats with Sysdig Live

Discover how Sysdig Secure’s new “Kubernetes Live” informs of your Kubernetes security posture at a glance. The new Live feature allows you to evaluate and respond instantly to threats. It understands and dynamically maps the live infrastructure, workloads, and relationships between them, compared to static CSPMs or context-blind EDR products. Kubernetes Live simplifies investigation processes by offering a unified view Sysdig Secures Kubernetes related data. It aggregates information, from detection, to vulnerabilities to network access, into a single platform for easier oversight.

Prakash Panjwani Named "CEO of the Year" at 2023 Tech Ascension Awards

Today, we are proud to share the exciting news around WatchGuard CEO Prakash Panjwani’s big win at the annual Tech Ascension Leadership Awards – taking home the program’s prestigious “CEO of the Year” title for 2023! The Tech Ascension Awards program recognizes the top technology companies and leaders driving cutting-edge, innovative solutions to solve critical challenges in their respective markets.

Corporate KYC: How to Verify and Onboard Businesses

Corporate KYC, also known as KYC of Company, is the process of screening a business or corporate body and its beneficiary owners for AML/KYC compliance. This blog article will teach you about KYC Requirements for Corporates, the Corporate KYC process, what information a corporate client must submit, and how corporate KYC procedures may be automated using simple technologies.

Devo Exchange - MITRE content packs & alerts

With the ever-increasing need for strong threat detection and management activities, more and more organizations are incorporating the MITRE ATT&CK framework into their incident investigation systems. Devo Exchange provides a plethora of MITRE content, and replicates the MITRE ATTA&K Matrix and its comprehensive list of tactics and techniques.

Device Authority's Certificate Lifecycle Management Platform

In today’s digital landscape, where security breaches and data vulnerabilities are rampant, organizations must be equipped with robust measures to protect their valuable assets. One critical aspect of cybersecurity is managing certificates effectively throughout their lifecycle. But what exactly is Certificate Lifecycle Management? And how can it benefit your business?