Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vector Capital Acquires Majority Ownership of WatchGuard Technologies

Over the last 25 years, WatchGuard has driven consistent innovation and growth. In recent years that growth accelerated significantly—fueled by our aggressive portfolio expansion and our ability to build and retain an enviable channel community—as we united behind the mission of making enterprise-grade security accessible to all customers via Managed Service Providers (MSPs).

Privileged Access Management: Essential and Advanced Practices

Managing access rights of privileged users is one of the cornerstones of data security. That’s why the privileged access management (PAM) market is booming with tools and practices. But this variety of PAM options makes it challenging to figure out which practices and controls your organization can benefit from.

CIS Control 17: Incident Response Management

We all know that it is a question of when you will be compromised and not if you will be compromised. It is unavoidable. The goal of CIS Control 17 is to ensure that you are set up for success when that inevitable breach occurs. If an organization is neither equipped nor prepared for that potential data breach, they are not likely to succeeded in responding to the threat.

Ransomware: A Cloudy Forecast

Ransomware remains high on the risk register for most enterprises, yet this threat has morphed into more targeted and insidious forms with multiple dimensions and points of coercion. As mobile working and cloud adoption became the norm, your data is now distributed, hard to monitor, and your organization’s operations are at risk. Identity is the new perimeter and the first place a modern ransomware crew will go to work. In this session, security professionals and enterprise leaders will learn.

Detect Credential Access with Elastic Security

Within our Elastic Security research group, a strong area of focus is implementing detection mechanisms for capabilities we understand adversaries are currently exploiting within environments. We’ll often wait to see the impact that bringing these capabilities to market will have from a detection standpoint. This allows our researchers to explore different detection strategies through these additions, providing deep insight into how effective the Elastic Security platform can be.

CTO Corner with Yoav Landman, Episode 2: The Importance of Securing Binaries

Want a glimpse at what it is like to be a CTO of a DevOps company? Join JFrog’s CTO Yoav Landman for our new CTO Corner Series. Each episode will feature a topic that is at the forefront of every technologist's mind… or should be. Yoav will be discussing hot topics in tech with other industry leaders giving you an opportunity to see behind the curtain of the decision makers.

PCI DSS 4.0 and ISO 27001 - the dynamic duo

It’s not often we can say this, but 2022 is shaping up to be an exciting time in information governance, especially for those interested in compliance and compliance frameworks. We started the year in eager anticipation of the new version of the international standard for information security management systems, ISO 27001:2022, soon to be followed by version 4.0 of the PCI DSS standard.

UNDER PRESSURE: Enterprise IT Teams Use NQE To Reduce Time-Intensive Processes

Today's enterprise IT teams are well acquainted with the pressures of ensuring network security, while also managing the time it takes to do so. The recent experience of one multinational technology company perfectly illustrates how Networks Query Engine (NQE) can be used to quickly and effectively bolster network security. As with most companies, this company's IT team was asked on a regular basis to locate IP addresses in the network.