Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Does a VPN Protect You From Hackers?

While VPNs may protect you from some types of cyber attacks launched by hackers, they don’t protect you from all of them. For example, VPNs may protect you from Man-in-the-Middle (MITM) attacks, remote hacking, Distributed Denial-of-Service (DDoS) attacks and session hijacking, but VPNs will not protect you from hackers who steal encryption keys, or from account compromise, phishing attacks or illegitimate websites.

CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils

On March 29th, 2024, a backdoor in a popular package called XZ Utils was announced on the Openwall mailing list. This utility includes a library called liblzma which is used by SSHD, a critical part of the Internet infrastructure used for remote access. When loaded, the CVE-2024-3094 affects the authentication of SSHD potentially allowing intruders access regardless of the method.

Why Offensive Security is a Necessity for a Dynamic Threat Landscape

Today's ever-shifting threat landscape demands a multi-pronged approach to cybersecurity. Organizations must go beyond mere compliance by employing a combination of offensive security tactics and frequent testing. This empowers them to effectively manage organizational exposure and protect critical assets from evolving threats such as ransomware.

Kerberos v5 Authentication

Kerberos stands as the default authentication protocol facilitating secure service requests between trusted devices within a network. It has been an integral component of Windows Active Directory (AD) environments since the era of Windows 2000. When a user logs into their computer, Kerberos undertakes mutual authentication, ensuring both the user and the server validate their identities.

WatchGuard Earns 8th Consecutive 5-Star Rating in CRN's 2024 Partner Program Guide

CRN has once again honored WatchGuard with a prestigious 5-star rating in its annual Partner Program Guide! The 2024 recognition marks the 8th consecutive year that the WatchGuardONE partner program has earned top marks in CRN’s definitive directory of the most rewarding partner programs for the IT channel.

Taking Off: Everything You Need to Know About Helicopter Courses

If you've ever fantasized about soaring through the skies, enrolling in a helicopter training program could be the key to turning that dream into reality. Whether you're aiming to kickstart a career as a pilot or simply seeking the excitement of piloting a helicopter, these courses provide learning and personal development opportunities. Here's everything you need to know.

Vanta Introduces ISO 42001 to Ensure Responsible AI Usage and Development

Helping customers leverage AI responsibly with a focus on the AI lifecycle and continuous improvement. VantaCon comes to London 23 April to bring together leading voices on the intersection of AI and trust. Featuring Google DeepMind, Financial Times, Sequoia Capital, Proofpoint, Checkout.com and more.

Top tips: Benefits of data backup and recovery

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’ll look at four ways your organization can benefit from having a strong data backup and recovery system. The value of data in today’s market cannot be highlighted enough. With so much emphasis given to data, it is only sensible to ensure that we put measures in place to ensure this data is protected from prying eyes and is safe from being lost.

Emerging Threats: What's New in the Cybersecurity Landscape?

In a time where sensitive information is increasingly moving online, AI systems are developing and we are increasingly relying on the internet in our day-to-day activities, cybersecurity threats loom larger than ever. A recent study found that cyber attacks are escalating at an unprecedented rate, with a new attack now occurring every 39 seconds. While a startling statistic, this shouldn't come as a surprise, in 2024 just about everyone is inundated with hacking attempts and scams whether the attack is a phone call, text, email or malicious software.