Wi-Fi in WatchGuard Cloud

Wi-Fi has evolved as an essential need across the globe. WatchGuard is delivering Wi-Fi 6 access points with WPA3 encryption for enriched security. Managed directly in WatchGuard Cloud, these secure access points enable zero-touch deployment, monitoring, and reporting plus integration into WatchGuard’s portfolio of products such as AuthPoint, Endpoint, and Firebox.

Benefits and Risks of Social Media

Social media can be a great way to stay connected with friends and family, but it also poses risks. In this blog post, we will explore the dangers of social media for kids, teens, individuals and businesses as well as the benefits. We will talk about the social media risks and how to protect yourself from them. There are many ways that you can reduce your risk when using social media sites like Twitter or Facebook.

SquirrelWaffle and MirrorBlast: what organisations need to know

Defending against loader-type malware is crucial to avoid a potential ransomware incident, given the fact that is the foothold of the attack kill-chain related to ransomware tactics, techniques and procedures (TTPs). Two of the most recent malware loaders to emerge are SquirrelWaffle and MirrorBlast. While SquirrelWaffle delivers Cobalt Strike payloads to victims, MirrorBlast uses novel techniques to gather intelligence and drop malicious payloads onto devices.

Software Composition Analysis Mitigates Systemic Risk in the Popular NPM Repository

Chris Wysopal, Veracode Chief Technology Officer and Co-Founder, recently sat down to discuss the open source supply chain attack on the popular NPM repository. Below is the transcript and corresponding video of his reaction.

Label standard and best practices for Kubernetes security

In this blog post, I will be talking about label standard and best practices for Kubernetes security. This is a common area where I see organizations struggle to define the set of labels required to meet their security requirements. My advice is to always start with a hierarchical security design that is capable of achieving your enterprise security and compliance requirements, then define your label standard in alignment with your design.

Protecting Users from Malicious Sites with Falcon for Mobile

Protecting Users from Malicious Sites with Falcon for Mobile Falcon for Mobile protects users by preventing connections to malicious sites on both iOS and Android devices. Some examples of sources for these malicious connections are texts, emails, apps, or even QR codes. Falcon for mobile can block navigating to malicious sites and notifying the user why it was blocked, educating the user and reducing the risk in the future.

Citizen Developers Security Awareness

Citizen developers are now producing the types of applications once reserved for professional programmers. By using the low-code/no-code capabilities found in low-code application development platforms (LCAP), business workflow automation or RPA, they can bypass drawn-out development processes and reap the benefits of speed and efficiency. Perhaps even more significant is the resulting efficacy—because who knows better than the citizen developer what the company needs to solve its pain points?