Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

4 Types of Data The FedRAMP Boundary Generates and What it Means For You

The FedRAMP PMO recently announced new rules for how contractors will need to comply with the Federal Risk and Authorization Management Program (FedRAMP) Authorization Boundary rules in draft format. This is a big deal because FedRAMP compliance is mandatory for any company that wants to do business with the federal government.

How to achieve FedRAMP Certification?

We previously covered the basics of FedRAMP by simply asking “What is FedRAMP?” This time, we’re going to talk about how you can get approved as a FedRAMP Cloud Service Provider (CSP). We’ll talk about some of the advantages of being FedRAMP authorized. We’ll also discuss FedRAMP compliance versus certification to understand the difference. Additionally, we will define terms you will need to know during your FedRAMP journey.

Understanding DNS attacks: Identifying and patching vulnerabilities

The Domain Name System (DNS) translates domain names into IP addresses. Every device and website has an IP address that other devices, websites, and online services use to communicate with it. IP addresses are a string of numbers usually formatted as 000.000.000.000. However, we use domain names since people can’t easily remember these numbers.

How to Stay Protected Against Student Loan Forgiveness Scammers

The Biden administration formally started the application for federal student loan forgiveness on Monday, October 17th, 2022. Recipients who qualify are eligible for the discharge of up to $10,000 of their loans for non-Pell Grant recipients and up to $20,000 for Federal Pell Grant recipients.

SOC Talent: How to Stay Competitive in the Hiring and Retention Game

The disparities in some key areas in our 2022 Devo SOC Performance ReportTM provide clear evidence that the issues facing organizations since the start of the global pandemic in early 2020 continue to affect SOC performance, especially in the areas of hiring and retaining SOC talent.

Webinar: Top Security Threats Worldwide: Q2 2022 - 20 October 2022

Join WatchGuard CSO Corey Nachreiner and Security Engineer Trevor Collins as they cover the latest Internet Security Report from the WatchGuard Threat Lab. In this session, Corey and Trevor will dive into the attack trends and latest malware variants targeting WatchGuard Firebox and Endpoint customers worldwide.