Discover how Single Logout (SLO) in Drupal enhances security by syncing session expiry with token expiry. Eliminate dormant sessions, prevent misuse, and ensure secure logouts across all connected applications.
On September 17, 2025, WatchGuard released fixes for a critical out-of-bounds write vulnerability (CVE-2025-9242) in the iked process of WatchGuard Fireware OS, which powers their Firebox firewall appliances. This flaw allows a remote unauthenticated threat actor to execute arbitrary code and affects both the mobile user VPN with IKEv2 and the branch office VPN with IKEv2 when configured with a dynamic gateway peer.
On September 17, 2025, SonicWall released a knowledge base article detailing the exposure of firewall configuration backup files stored in certain MySonicWall accounts. SonicWall states that after identifying the incident they began an investigation containing the incident, terminating the ‘unauthorized access point’, and working with law enforcement and select cybersecurity agencies globally.
MSSPs don’t succeed because of the vendors they choose or the SIEM they prefer. They succeed when their operating model scales profitably. Yet most industry content feels like sales brochures, comparing one tool to another. The truth is, successful providers use many combinations of vendors. What separates winners from losers isn’t which tools they pick, it’s the foundation they build on.
Containerized applications have become the backbone of modern digital services. They allow you to package applications and dependencies into portable units that can run anywhere—on-premises, in private clouds, or across public cloud platforms. But with this agility comes risk. Containers, like any other software, are prone to vulnerabilities.
The traditional network perimeter is dead. Your sensitive data now travels paths that legacy DLP solutions can't see—from Salesforce to Google Drive, across laptops, into personal Dropbox accounts, and through AI chatbots. No single traditional DLP catches all of this. We're at a turning point where shadow AI and rapid data movements expose blind spots that legacy solutions simply can't address. The reality?
Some content stays with you forever. The worst images don’t just fade — they reappear, uninvited, at 3am. Cybersecurity professionals dealing with traumatic material can experience delayed, persistent emotional fallout. It’s not weakness. It’s impact.#CyberSecurity.
Are you prepared for the psychological toll that comes with handling disturbing content in the cybersecurity world? Welcome to Razorwire, where today we’re exploring the realities behind a career in cyber — from technical warfare to the often-overlooked human cost. In this episode, I’m joined by therapist and consultant Eve Parmiter to examine the real psychological impact of repeated exposure to distressing material that many of us face during incident investigations, content moderation and threat research.
Get up to speed on the most impactful IT trends and discover how JumpCloud is leading the charge. We'll dive into JumpCloud AI, and cover recent Reporting Releases.