Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Divine SASE Touch

The Paris Olympics are coming up, arousing excitement and anticipation around the globe. As the world’s greatest athletes prepare to compete on this renowned stage, let’s shift our focus to a few of the earliest Olympics competitors – the Greek Gods. These deities, myth says, competed in the ancient Olympics, and later on, the Games were held in their honor. To this day, the Olympics are a global festival of what the Gods symbolized – strength, resilience and elegance.

Security Live with AWS and Arctic Wolf

Each episode of Security Live features AWS and AWS Partners who are working to solve security challenges for customers. And few companies are doing that with the scale, speed, and efficiency of Arctic Wolf. In this episode, Arctic Wolf CISO Adam Marre explains how Arctic Wolf is solving the operations problem in the cybersecurity industry by providing the platform and human element to help organizations get the outcomes they need out of the tools in their tech stack.

Protiviti and BlueVoyant Forge Strategic Partnership to Reinforce Cybersecurity Service Offerings Powered by the Microsoft Security Platform

We're excited to announce that Protiviti, a global leader in consulting services and recognized authority in Microsoft compliance and identity, has formed a strategic partnership with BlueVoyant, an industry-leading MXDR Sentinel services provider, that additionally offers an AI-driven cyber defense platform.

MitM Attacks: Understanding the Risks and Prevention Strategies

As our interactions with the digital world grow, connections will be established within seconds, leading to more online attacks. One type of attack we may be exposed to is known as a Man-in-the-Middle (MitM) — a technique cyber attackers use to take over our online communications. The best way to stay safe online is with a better understanding of the problems caused by these digital attacks and identification of the dangers and consequences they entail.

Top Security Threats Worldwide Q1 2024

Join WatchGuard CSO Corey Nachreiner and Security Engineer Trevor Collins as they discuss key findings from the WatchGuard Threat Lab’s Q1 2024 Internet Security Report. You’ll learn about the latest malware trends, like network-based detections dropping almost 50 percent, but endpoint detections rising over 75 percent. They’ll also cover the top network exploits, illustrate a common phish our DNS firewall blocked, and much more.

Post iOS Jailbreak Customization: Exploring iOS Tweaks & Private APIs

If you have ever jailbroken an iOS device, you have likely encountered many things that we will discuss today. Let's start with one of the most commonly used terms that gets thrown around: iOS tweaks. There are plenty of them out there, depending on the needs - whether for fun or profit, simple or complex - ranging from making your lock screen look fancy to running your banking app on a jailbroken device.

UPS Text Scam Examples

Some examples of UPS text scams include confirming details about a fake delivery, fake package delivery notifications, fake package delivery fee requests, fraudulent suspicious activity on your UPS account or an error with a delivery. According to the Federal Trade Commission (FTC), in 2023, over $650 million was lost to imposter scams, including UPS text scams. Keep reading to find out what different UPS text scams look like and how you can stay protected against this kind of scam.

Cloudy with a Chance of Hackers: Protecting Critical Cloud Workloads

For many enterprises, cloud resources are becoming the data center's core. As these resources grow, it can be difficult for IT staff to keep up with daily administrative tasks, let alone learn the skills to provide security protections. So, how does one protect a variety of workloads in the cloud without having to worry about security misconfigurations?