Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vector Capital Acquires Majority Ownership of WatchGuard Technologies

Today, WatchGuard announced that Vector Capital, a leading private equity firm specializing in transformational investments in established technology businesses, closed the deal to acquire interests previously owned by other co-investors, and become the company’s majority shareholder.

Vector Capital Acquires Majority Ownership of WatchGuard Technologies

Sandy Gill, Managing Director at Vector Capital, a leading private equity firm specializing in transformational investments in established technology businesses, talks about Vector acquiring majority ownership of WatchGuard Technologies, and why the company is uniquely positioned to take advantage of two major market forces – the rise of the MSP as the dominant and fastest growing source of cybersecurity, and the maturation of platform-based security offerings.

The True Cost of a Security Breach

There have been many articles about the cost of a security breach. With the emergence of privacy regulations that assign penalties based on a business’ profit, or those that calculate a value for each compromised record, it is possible to calculate the cost of a breach based on those metrics. However, it would seem that these hard numbers are not detailed enough to placate many security professionals.

Zapier Storage Exposes Sensitive Customer Data Due to Poor User Choices

Zenity research team has recently discovered a potential customer data leakage in Storage by Zapier, a service used for simple environment and state storage for Zap workflows. With only a few simple steps and no authentication, we were able to access sensitive customer data. Given the nature of this flaw, it would be easy for bad actors to recreate our approach and access the same sensitive data without significant expertise.

Cloud Configuration Drift: What Is It and How to Mitigate it

More organizations than ever run on Infrastructure-as-Code cloud environments. While migration brings unparalleled scale and flexibility advantages, there are also unique security and ops issues many don’t foresee. So what are the major IaC ops and security vulnerabilities? Configuration drift. Cloud config drift isn’t a niche concern. Both global blue-chips and local SMEs have harnessed Coded Infrastructure.

How Zero Trust Strengthens Password Security

Password security is crucial to preventing cyberattacks. It is important to find a password manager that enables the zero-trust security model to mitigate the risks of data breaches from compromised user accounts. The U.S. government released a memorandum earlier this year, detailing the requirement for federal agencies to achieve zero trust by the end of Fiscal Year 2024 in an effort to strengthen their cyberdefenses.

Cyber Security Professionals Shortage, Burnout & How To Protect Against It | Razorwire Podcast

Welcome to another episode of Razorwire Podcast! In this episode, our guests are Oliver Rochford of Techcron, who you've met in earlier episodes, and Stefania Chaplain, a solutions architect, discussing the skills shortage, burnout in cyber careers, and remote working. Cybersecurity offers both rewards and challenges simultaneously. Security providers in their early careers struggle to find work, while recruiters struggle to find the proper role and qualification for their security needs as cybersecurity is a multifaceted field.

The Evolution Of Cyber Security & Trends To Watch For | Razorwire Podcast

Welcome to another episode of Razorwire Podcast! There is no doubt that the world has gone through massive changes over the past few years. We have faced pandemics, lockdowns, wars, supply chain issues and economic crises. As the whole world moves online, large scale innovations have been boosted. To infosec enthusiasts, this raises an interesting question: what is in store for the industry?