Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The data ditch: a toolkit to identify and escape it

The dreaded data ditch. You might not even know your organization is stuck in it – the company might still be acting on gut feel as opposed to relying on data, the data you have might be ungoverned and inaccurate, or you’re waiting weeks, even months, for your teams to glean useful insights. You’re not alone. Data leaders like yourself keep falling into the data ditch.

Introduction to penetration testing for developers

Developers take a lot of pride in their work. We strive to consistently deliver the best code and avoid dangerous edge-cases. Which is why we aim to detect and remediate bugs before they ship through testing and code reviews. However, when it comes to security, sometimes we fall flat. When a team lacks the proper security tooling, it can stunt development, create extra work, and deliver dangerous security defects to clients and end-users.

Securing cloud infrastructure for PCI review

The PCI certification process is quite comprehensive and relates to infrastructure, software and employee access to systems, in particular to datasets and the way that they are accessed. These checks are critical not only to the wider payments industry but also to create a level of trust with users knowing their data is protected. The PCI compliance process is a number of checks, usually by an accredited third party, to ensure that secure data handling processes are in place.

Gain a full view of your vendor ecosystem with Automatic Vendor Detection

SecurityScorecard is the global leader in cybersecurity ratings, empowering you with trusted data and the confidence to make smarter and faster decisions. Security ratings give you an outside-in view of the cybersecurity posture of any organization in the world across ten key risk factor groups. Our Automatic Vendor Detection (AVD) instantly gives you a view of your entire third and fourth-party ecosystem, enabling you to visualize and take proactive steps to mitigate risk.

Webinar: Top Security Threats Worldwide: Q3 2021 - 18 Jan 2022

Join WatchGuard CSO Corey Nachreiner and Security Operations Manager Marc Laliberte as they discuss key findings from the latest Internet Security Report from the WatchGuard Threat Lab. Fueled by the Firebox Feed, threat intelligence gathered from WatchGuard Firebox customers who have opted-in to sharing adversarial data, the report highlights the latest malware, network attacks and malicious domains targeting small and midmarket enterprises.

What is Cyber Hygiene? Definition, Benefits, & Best Practices

You’ve likely been practicing good personal hygiene since childhood, but have you heard of cyber hygiene? Similar to personal hygiene practices which maintain good health and well-being, cyber hygiene practices maintain the health and well-being of your sensitive data and connected devices. This blog will define cyber hygiene, discuss the importance of maintaining cyber hygiene and explore best practices for ensuring cybersecurity.

US Officials Warn - Heightened Risk of Ransomware Attacks on Municipal Utilities

US Officials warn of potential ransomware attacks in response to increased sanctions on Russia and have asked state and local officials to consider how ransomware attacks could disrupt the provision of critical services. “Right now, the biggest concern we have are preparations for potential impacts to US utilities and industrial critical infrastructure, (Dragos)”