Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing cloud infrastructure for PCI review

The PCI certification process is quite comprehensive and relates to infrastructure, software and employee access to systems, in particular to datasets and the way that they are accessed. These checks are critical not only to the wider payments industry but also to create a level of trust with users knowing their data is protected. The PCI compliance process is a number of checks, usually by an accredited third party, to ensure that secure data handling processes are in place.

Gain a full view of your vendor ecosystem with Automatic Vendor Detection

SecurityScorecard is the global leader in cybersecurity ratings, empowering you with trusted data and the confidence to make smarter and faster decisions. Security ratings give you an outside-in view of the cybersecurity posture of any organization in the world across ten key risk factor groups. Our Automatic Vendor Detection (AVD) instantly gives you a view of your entire third and fourth-party ecosystem, enabling you to visualize and take proactive steps to mitigate risk.

Webinar: Top Security Threats Worldwide: Q3 2021 - 18 Jan 2022

Join WatchGuard CSO Corey Nachreiner and Security Operations Manager Marc Laliberte as they discuss key findings from the latest Internet Security Report from the WatchGuard Threat Lab. Fueled by the Firebox Feed, threat intelligence gathered from WatchGuard Firebox customers who have opted-in to sharing adversarial data, the report highlights the latest malware, network attacks and malicious domains targeting small and midmarket enterprises.

What is Cyber Hygiene? Definition, Benefits, & Best Practices

You’ve likely been practicing good personal hygiene since childhood, but have you heard of cyber hygiene? Similar to personal hygiene practices which maintain good health and well-being, cyber hygiene practices maintain the health and well-being of your sensitive data and connected devices. This blog will define cyber hygiene, discuss the importance of maintaining cyber hygiene and explore best practices for ensuring cybersecurity.

US Officials Warn - Heightened Risk of Ransomware Attacks on Municipal Utilities

US Officials warn of potential ransomware attacks in response to increased sanctions on Russia and have asked state and local officials to consider how ransomware attacks could disrupt the provision of critical services. “Right now, the biggest concern we have are preparations for potential impacts to US utilities and industrial critical infrastructure, (Dragos)”

How to Stimulate Organizations' Security Awareness Training Programs

We all know how important security awareness training is for an organization. Moreover, we try to enhance our efforts by weaving security into the “culture” of the organization. Yet, from the employee’s perspective, it all gets very stale. It seems like it is always the same message, but if that is the case, why hasn’t this knowledge been adopted into the corporate consciousness? Perhaps it is our approach.

Webinar: The Importance of Firewall in a Unified Security Platform - 15 Feb 2022

As our users continue to connect from remote locations, it may seem as if the core network protections provided by a firewall are less important. No matter where your users connect, effective protection for your organization requires extending the capabilities of the network beyond your traditional perimeter. Learn how integrating your firewall into a larger Unified Security Platform can improve accuracy, reduce time to detection, and keep your organizations safe from attacks that exploit remote connectivity.