Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why You Shouldn't Share Your Netflix Password, Even With Your Parents

Until recently, Netflix wasn’t too concerned about its members sharing their accounts with friends and family. In a 2016 statement, Reed Hastings, Netflix CEO said “password sharing is something you have to learn to live with, because there’s so much legitimate password sharing, like you share with your spouse, with your kids… so there’s no bright line, and we’re doing fine as it is.”

A Timeline of the Top 15 Cybersecurity Acronyms & Abbreviations

At WatchGuard, we’re all about security simplified. But living this mission becomes challenging when we’re constantly faced with a barrage of information technology (IT) acronym soup. Whenever I read the latest blog post or I hear the latest cybersecurity news, one of those dreaded acronyms inevitably appears. In IT, the acronyms are prolific.

Navigating APRA's CPS 234: A Universal Metric

In an era where digital innovation has become the lifeblood of businesses, cybersecurity has taken center stage in the corporate world. The Australian Prudential Regulation Authority (APRA) recognized this need and introduced CPS 234, a regulation that puts cybersecurity at the forefront of APRA-regulated entities. APRA is currently conducting an independent tripartite cyber assessment of compliance with CPS234, which took effect in 2019.

Scarleteel 2.0 and the MITRE ATT&CK framework

In this blog post, we will take a comprehensive dive into a real-world cyber attack that reverberated across the digital realm – SCARLETEEL. Through an in-depth analysis of this notorious incident using the MITRE ATT&CK framework, we aim to unearth invaluable insights into the operational tactics of cyber adversaries.

7 Compelling Reasons Why Analysts Recommend SASE

Gartner introduced SASE as a new market category in 2019, defining it as the convergence of network and security into a seamless, unified, cloud-native solution. This includes SD-WAN, FWaaS, CASB, SWG, ZTNA, and more. A few years have gone by since Gartner’s recognition of SASE. Now that the market has had time to learn and experience SASE, it’s time to understand what leading industry analyst think of SASE?

Dockerfile WORKDIR: How to Get Started and Advanced Usage

Welcome to the world of Docker containers, where the power of isolation and portability meets streamlined application development. Whether you’re an experienced Docker user or just starting your containerization journey, effectively understanding and utilizing WORKDIR can significantly enhance your development workflow. 61% of respondents to a recent Statista survey said they use Kubernetes, putting Docker and Kubernetes among the most in-demand skills by software firms globally.

A Bucket of Phish: Attackers Shift Tactics with Cloudflare R2 Public Buckets

In our previous blog, we found a lot of phishing and scam URLs abusing Cloudflare services using pages.dev and workers.dev domains, respectively. We’re now seeing a lot of phishing emails with URLs abusing another Cloudflare service which is r2.dev.

Keeping cybersecurity regulations top of mind for generative AI use

Can businesses stay compliant with security regulations while using generative AI? It’s an important question to consider as more businesses begin implementing this technology. What security risks are associated with generative AI? It's important to earn how businesses can navigate these risks to comply with cybersecurity regulations.

How Secure Is Your Authentication Method?

I frequently write about authentication, including PKI, multi-factor authentication (MFA), password managers, FIDO, Open Authentication, and biometrics. I have written dozens of articles on LinkedIn and have presented during many KnowBe4 webinars about different authentication subjects. I have been professionally writing about authentication since at least November 2004, when I wrote my first ebook for Windows & IT Pro magazine on password attacks and security.