Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CMMC compliance and the critical role of MDM-style USB control in protecting CUI

CMMC compliance is now mandatory for companies handling Controlled Unclassified Information (CUI) or Federal Contract Information (FCI). The new 48 CFR rules require organizations to demonstrate effective data security practices. In air-gapped environments, USB encryption and strict data control are essential to maintaining compliance and protecting CUI.

Data classification and DLP: Prevent data loss, prove compliance

A successful data security strategy isn’t about one tool, it’s about a sequence of steps. The first is understanding your data. The second is controlling how it moves. Together, classification and DLP create a data security foundation that prevents data leaks and breaches without slowing down the business. Unlike point tools, modern data classification solutions continuously scan repositories in real time, ensuring new files and updates are labeled correctly as your environment changes.

WatchGuard Named Market Leader in Four Categories by Top InfoSec Innovators 2025

WatchGuard is proud to announce that we have been named a Market Leader in four critical categories by the Top InfoSec Innovators Awards 2025: Cybersecurity Service Provider, Endpoint Security, Managed Detection and Response (MDR), and Zero Trust Platform.

CrowdStrike 2025 European Threat Landscape Report: Extortion Rises, Nation-State Activity Intensifies

Europe remains a prime target for global adversaries. Financially motivated eCrime groups continue to target the region as espionage and hacktivism escalate amid geopolitical turmoil stemming from ongoing conflicts. The CrowdStrike 2025 European Threat Landscape Report, based on frontline intelligence from CrowdStrike’s elite threat hunters and intelligence analysts, provides a definitive view of adversaries operating within or targeting Europe.

Kroll Conversations: Meet the DFIR Experts

A cyberattack is one of the most devastating experiences a company can go through. Yet for Jaycee Roth and Justin Harvey, being there for organizations when the worst happens is business-as-usual. As part of the Digital Forensics and Incident Response (DFIR) team within Kroll’s Cyber and Data Resilience business, their guidance and support ensures companies can recover fully from the disruption caused by a security incident.

Report: AI Poisoning Attacks Are Easier Than Previously Thought

Attackers can more easily introduce malicious data into AI models than previously thought, according to a new study from Antropic. Poisoned AI models can produce malicious outputs, leading to follow-on attacks. For example, attackers can train an AI model to provide links to phishing sites or plant backdoors in AI-generated code.

The Legacy of Agent-Based Backup

Historically, agent-based backup systems have been the norm. These systems operate by running software on the production machine, in tandem with the production application. The agent must communicate with its central data protection server for backups to be executed. The agent’s role is to read production data through the OS layer, process it, and transmit backup data to a media or backup server, where it is ultimately stored on a typically proprietary backup storage device.

What is RTO? Why Recovery Time Objective Matters for Businesses

A business experiences numerous threats daily. The survival of a business depends on how quickly it can resume its operations after incidents that compromise critical infrastructure or applications. Many companies face unexpected situations that cause service interruptions and generate system unavailability. They require rapid restoration to reduce the financial losses. Competition in the business world is fiercer than ever.

What Is RPO (Recovery Point Objective)? Meaning, Importance, and Best Practices

Every business expects smooth operations without any downtime and data loss. But that happens only in a perfect world. In the real world, systems go down and data gets lost, forcing teams to work on recovery plans. But how do recovery plans work? For that, it’s important to understand Recovery Point Objective (RPO), a key part of any disaster recovery or business continuity strategy.

How to monitor MCP server activity for security risks

The Model Context Protocol (MCP) is a popular framework for connecting AI agents to data sources, such as APIs and databases. Because this technology is still new and evolving, its security standards are also in the early stages. This means that MCP servers are susceptible to misuse, so teams building and running them internally need visibility into server interactions to keep their environments safe from attacks.