Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The DORA Act: Transforming Digital Operational Resilience in Cybersecurity

The Digital Operational Resilience Act, or DORA, is set to redefine the landscape of digital security and operational resilience. In this video, we explore the key provisions and implications of DORA, which aims to strengthen the cybersecurity framework across the European Union.

Invest in PAM to reduce your Cyber Insurance premiums

Cyber insurance has become a key component of risk management for many organizations. However, it can be difficult to keep up with cyber insurance requirements and avoid high premiums. One of the best ways to secure better cyber insurance coverage and premiums is by implementing a solid Privileged Access Management (PAM) solution.

Tutorial: Import a Certificate to the Firebox

#cybersecurity #technology #watchguard #wgsupport #firebox
In this WatchGuard Support video, you will learn how to import certificates on the firebox. Information includes:

  • Private key source
  • Available certificate import options on the Firebox
  • Complete the import process

To learn more about WatchGuard Support and other features, follow the link: https://wgrd.tech/3FoQ0eg

Latest Cyber Threat: Quishing or QR Code Phishing Method

As technology continues to advance, businesses are utilizing various methods to streamline their operations and enhance their online presence. One of the approaches that have gained popularity over the years is the use of Quick Response (QR) codes. These codes make it easy for customers and employees to access information quickly and conveniently. However, cybercriminals.

Microsoft GDAP (granular delegated admin privileges)

If you have a CSP, MSSP, reseller or any other 3rd party that has access to your environment(s) and GDAP isn’t implemented, it’s likely they have the Global Administrator role by default. If your provider hasn’t contacted you about GDAP and/or implemented it already, you’d be right to question what else they haven’t done for you!?

Staying ahead of LockBit ransomware attacks

LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit ransomware attacks in 2023. The LockBit RaaS group came into existence in 2019 and has posed great challenges to security experts ever since. A recent report states that LockBit accounted for over one-third of all ransomware attacks in the latter half of 2022 and the initial quarter of 2023.

Add Your Own Custom Secrets Detectors To GitGuardian

Did you know you can add custom detectors to make GitGuardian Secrets Detection even more powerful? GitGuardian already looks for over 390 different types of specific secrets - from Adobe and AWS keys to Zoom and Zendesk Tokens. That's on top of looking for over a dozen generic patterns like Bearer tokens and JSON web tokens. Now, anyone on a Business plan or higher can request to extend GitGuardian's secrets detection engine to support detectors specific to their organization.

How To Conduct An Azure Security Audit: The Actionable Guide

Over 56% of organizations globally use Microsoft Azure for their cloud services owing to its convenience, cost-effectiveness, and scalability. It is vital to secure your Azure environment against the backdrop of an ever-evolving threat landscape. Otherwise, your database and digital assets can leak sensitive data. And one way to do it is through Azure security audits.

Will today's security purchases stop tomorrow's deadliest threats?

In the first installment of this three-part series based on our recent white paper, The Skeptic’s Guide to Buying Security Tools, we outlined an evidence-based approach to helping your organization justify a new security tool purchase. This included identifying where security gaps exist, if those gaps could be filled by existing tools, and—if not—how to evaluate potential tools that could help.