Differences Between Penetration Testing and Vulnerability Scanning

Often, penetration testing (or pen testing) and vulnerability scanning are used interchangeably. In doing so, the importance of each method of testing gets lost in the confusion. Both of these are significant in protecting your data and infrastructure for different reasons. In the age of digitally storing information and companies having an online network presence, it’s easy for hackers to find their way in. This is why both pen testing and vulnerability scanning are important.

WatchGuard Cloud Named Best MSP/MSSP Platform in CRN's 2021 Tech Innovator Awards

WatchGuard been honored in CRN’s 2021 Tech Innovator Awards, with WatchGuard Cloud named the best MSP/MSSP Platform. Furthermore, CRN recognized the Firebox M4800 and M5800 as finalists in the Network Security – SMB category. This annual award program showcases innovative vendors in the IT channel across 47 different technology categories, in key areas ranging from cloud to storage to networking to security.

Unboxing BusyBox - 14 new vulnerabilities uncovered by Claroty and JFrog

Embedded devices with limited memory and storage resources are likely to leverage a tool such as BusyBox, which is marketed as the Swiss Army Knife of embedded Linux. BusyBox is a software suite of many useful Unix utilities, known as applets, that are packaged as a single executable file. Within BusyBox you can find a full-fledged shell, a DHCP client/server, and small utilities such as cp, ls, grep, and others.

Secure sensitive files and data in Box with Nightfall's Box DLP Scanner

Storing files safely in the cloud is one of the foundations of remote work. File sharing platforms like Box were popular before the pandemic for their ease of use and collaboration between users anywhere in the world. Now that we’re living and working in a world where remote work is the norm, they’ve become essential pieces of digital infrastructure.

LimaCharlie Achieves SOC 2 Certification

LimaCharlie has successfully completed its Service Organization and Control (SOC 2) audit. The audit was conducted by the Johanson Group, a leading professional service firm that focuses on SOC 2 & 3 examinations for public and private companies. The Johanson Group counts Cisco, Symantec and Broadcom among their many clients. They have members on the team that are Certified Information System Auditors (CISA) and are Certified Information Systems Security Personnel (CISSP).

Google takes a bold step toward securing your Gmail, but not without many complaints

Many Gmail users were recently greeted with a message that alerted them that 2-step verification will be required to log into their accounts starting on November 9th (today). While many in the security community have been advising people to turn on 2-factor, 2-step, or any other secondary security method on every account as a way to protect the login process, the Twitterverse showed that many people were unhappy with Google’s implementation of this mandatory change.

Vendor Management Best Practices

Establishing positive vendor relationships is crucial to running a successful business. Nonetheless, vendor management has several moving parts, and you have a lot of things to keep track of. This includes who your third parties are, the services they offer, which internal policies apply to them, and what sensitive data they have access to. Without a strong foundation of vendor management best practices, vendor risks could manifest into failures that could affect business continuity.