Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Leverage GSMA compliance to drive secure firewall configurations with Firewall Analyzer

The GSM Association, which stands for the Global System for Mobile Communications Association and is known more commonly as the GSMA, developed the Security Accreditation Scheme (SAS), a security standard and audit-based certification program that addresses various aspects of eSIM production and management. ManageEngine Firewall Analyzer now supports GSMA compliance for mobile operators and companies within the mobile ecosystem.

WatchGuard Wins in the CRN 2024 Annual Report Card (ARC) Awards

We’re pleased to announce that WatchGuard Technologies won two award categories in CRN’s 2024 Annual Report Card (ARC) program, from CRN, a brand of The Channel Company! These awards honor technology vendors who are committed to growing the IT channel through technology innovation and partner relationships.

UN Approves Controversial Cybercrime Treaty Amidst Concerns Over Tech and Privacy

A newly drafted United Nations treaty aimed at combating global cybercrime has sparked significant debate due to its potential implications for technology companies, privacy rights, and digital freedoms. The UN Convention Against Cybercrime, which advanced from committee to the General Assembly on August 8, 2024, could require nations to enforce stringent laws against unauthorized access to information systems and data interception, raising alarms among privacy advocates and cybersecurity experts.

Top 7 Practices to Prevent Data Leakage through ChatGPT

Generative AI (GenAI) tools like ChatGPT have already become indispensable across organizations worldwide. CEOs are particularly enthusiastic about GenAI’s ability to let employees “do more with less”. According to the McKinsey Global Survey on the State of AI in 2024, 65% of organizations already use GenAI tools extensively, and Gartner forecasts that this number will reach 80% by 2026.

Get Visibility Into the Cloud: Craig and Mike Secure the World, One Cloud at a Time

Mike Lossmann and Craig Johnson discuss enhancing cloud visibility for an upcoming audit, demonstrating how to ensure security in cloud environments. Highlights Craig explains the importance of knowing the cloud’s security posture. Forward Enterprise shows full multi-cloud visibility between cloud zones. Analysis reveals potential security gaps. Querying the entire cloud model identifies misconfigurations. Historical data allows for forensic analysis post-breach. Users can prepare for audits without last-minute scrambling.

Zero to 80% Faster - How to Leverage AI to Accelerate Security Reviews

Stop wasting your team's time answering security questionnaires. It's time to supercharge the way you complete security reviews by leveraging AI to unlock unprecedented speed and accuracy. We'll explore proven strategies for fast tracking the way your team completes security questionnaires using advanced AI tools and automation. You'll learn best practices like maintaining a centralized knowledge base and leveraging a public-facing trust portal to get ahead of questions.

CVE-2024-38856 -Apache OFBiz Pre-Auth RCE Vulnerability

A new zero-day vulnerability, CVE-2024-38856, has been discovered in the Apache OFBiz open-source enterprise resource planning (ERP) platform, presenting a critical threat to businesses worldwide. This pre-authentication remote code execution (RCE) flaw allows unauthenticated attackers to exploit weaknesses in OFBiz’s request handling, leading to unauthorized access and potentially damaging control over affected systems.

FBI and International Partners Dismantle Dispossessor Ransomware Operation

In a major breakthrough against cybercrime, the FBI, in collaboration with international partners, successfully disrupted the Dispossessor ransomware operation, seizing its servers and websites. This operation, which involved agencies from the United States, the United Kingdom, and Germany, marks a significant step forward in the global fight against ransomware.

Unifying Security Across Environments with Calico

As companies build more cloud-native apps, securing them across different infrastructures becomes a challenge. Cloud-native apps leveraging different deployment environments such as on-premises, public cloud, or hybrid have different security challenges as they are scaling, interoperable, and cost-effective.