Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How a Private Cloud Approach to SASE Helped Reduce Disruption From a Severed Sub-sea Cable

It feels like sub-sea cable disruptions are becoming ever more common, with recent reports of major outages caused by severed cables in the Mediterranean, the Red Sea, the North Sea, and—most recently—off the coast of Africa.

Winning the 10G Race with Cato

The rapidly evolving technology and digital transformation landscape has ushered in increased requirements for high-speed connectivity to accommodate high-bandwidth application and service demands. Numerous use cases, such as streaming media, internet gaming, complex data analytics, and real-time collaboration, require we go beyond today’s connectivity trends to define new ones.

Does a VPN Protect You From Hackers?

While VPNs may protect you from some types of cyber attacks launched by hackers, they don’t protect you from all of them. For example, VPNs may protect you from Man-in-the-Middle (MITM) attacks, remote hacking, Distributed Denial-of-Service (DDoS) attacks and session hijacking, but VPNs will not protect you from hackers who steal encryption keys, or from account compromise, phishing attacks or illegitimate websites.

CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils

On March 29th, 2024, a backdoor in a popular package called XZ Utils was announced on the Openwall mailing list. This utility includes a library called liblzma which is used by SSHD, a critical part of the Internet infrastructure used for remote access. When loaded, the CVE-2024-3094 affects the authentication of SSHD potentially allowing intruders access regardless of the method.

Why Offensive Security is a Necessity for a Dynamic Threat Landscape

Today's ever-shifting threat landscape demands a multi-pronged approach to cybersecurity. Organizations must go beyond mere compliance by employing a combination of offensive security tactics and frequent testing. This empowers them to effectively manage organizational exposure and protect critical assets from evolving threats such as ransomware.

Kerberos v5 Authentication

Kerberos stands as the default authentication protocol facilitating secure service requests between trusted devices within a network. It has been an integral component of Windows Active Directory (AD) environments since the era of Windows 2000. When a user logs into their computer, Kerberos undertakes mutual authentication, ensuring both the user and the server validate their identities.

WatchGuard Earns 8th Consecutive 5-Star Rating in CRN's 2024 Partner Program Guide

CRN has once again honored WatchGuard with a prestigious 5-star rating in its annual Partner Program Guide! The 2024 recognition marks the 8th consecutive year that the WatchGuardONE partner program has earned top marks in CRN’s definitive directory of the most rewarding partner programs for the IT channel.

Taking Off: Everything You Need to Know About Helicopter Courses

If you've ever fantasized about soaring through the skies, enrolling in a helicopter training program could be the key to turning that dream into reality. Whether you're aiming to kickstart a career as a pilot or simply seeking the excitement of piloting a helicopter, these courses provide learning and personal development opportunities. Here's everything you need to know.

Vanta Introduces ISO 42001 to Ensure Responsible AI Usage and Development

Helping customers leverage AI responsibly with a focus on the AI lifecycle and continuous improvement. VantaCon comes to London 23 April to bring together leading voices on the intersection of AI and trust. Featuring Google DeepMind, Financial Times, Sequoia Capital, Proofpoint, Checkout.com and more.