Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

(Re)Discover the Hidden Value of Single Sign-On

Modern zero trust is an information security model that denies users and devices access to applications, data, networks, and workloads by default. One of the optimal ways to help reduce credential-based attacks with applications is to leverage single sign-on (SSO) as part of your access management strategy. SSO combines simplicity with security by removing friction for users to access applications and reducing the administrative overhead and risks for IT associated with password management.

Weak Authentication Attacks: 49% report high costs

Cyberattacks on large companies grab the headlines, creating the false impression that only big organizations are targeted by cybercriminals. This misleads smaller companies into believing that they are not potential targets because of their size or low profile. However, threats against small and medium-sized companies have been a cause for concern in recent years. Experts warn that companies with fewer than 100 employees are especially vulnerable to a range of threats.

World Backup Day: How and why to make backup copies

Data protection continues to be a headache for many companies. Nowadays, data theft is a concern that affects organizations worldwide, making threat protection a priority but, for many, it is still a pending task. A recent report reveals that ransomware attacks are likely to compromise the data of 80% of organizations. Faced with this threat, cybersecurity experts stress the importance of backing up data to minimize damage if an attack does occur.

WatchGuard Earns 8th Consecutive 5-Star Rating in CRN's 2024 Partner Program Guide

CRN has once again honored WatchGuard with a prestigious 5-star rating in its annual Partner Program Guide! The 2024 recognition marks the 8th consecutive year that the WatchGuardONE partner program has earned top marks in CRN’s definitive directory of the most rewarding partner programs for the IT channel.

What is anti-tampering protection and how can it help a company's cybersecurity?

Cybercriminals are increasingly using new evasion strategies in their attacks in order to disable or alter company security controls. This year, there has been a surge in the use of hunter-killer malware that seeks to identify and eliminate enterprise defenses such as firewalls, antivirus, and next-generation EDR technologies. A recent report reveals a massive 333% increase in this type of malware.

Canalys Report on Trends and Opportunities for MSPs in 2024

The landscape of managed services is evolving rapidly, driven by an increasing demand for cybersecurity solutions. As the digital realm expands, so do the threats, making cybersecurity a paramount concern for businesses and a lucrative opportunity for MSPs across the globe. There are many trends MSPs should understand in order to take advantage of the opportunities available to them in 2024. Let’s take a look at some key data from Canalys analyst research.

(Re)Evaluate Workplace Access and Federation

One of the many difficulties faced by organizations has been how to create portability, reusability, and interoperability of digital identities from the on-premises realm to increasingly web-services-enabled environments. One of the earliest and most widely adopted approaches has been SAML (or Security Assertion Markup Language) and Identity Federation.

AnyDesk Case: What steps should users take to protect themselves?

On February 2, the popular remote access tool AnyDesk disclosed that it had suffered a cyberattack that had compromised its production systems. Although AnyDesk has not revealed specific details about the root cause of the attack, the measures taken to mitigate it, such as mandatory password resets and code signing certificate renewals, suggest that cybercriminals gained access to user passwords and the company's code signing certificate.

(Re)Imagine Workplace Access Management

As organizations seek out solutions to secure their hybrid and remote workplace, some daily tasks like signing into 10, 20, or 30 applications can really interfere with employee productivity. The fatigue of remembering so many passwords for so many applications nearly always leads to undesirable password behaviors such as password re-use and choosing weak passwords, plus the annoyance of forgotten passwords and the burden of resets.