Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard Recognized at ChannelPro Network's 2022 Reader's Choice Awards

We are thrilled to share that WatchGuard has secured Bronze in the “Best Network Security Vendor” category at this year’s ChannelPro Network Reader’s Choice Awards! This annual awards program is the IT channel’s only SMB-focused Reader’s Choice Awards by casting their votes for the vendors, distributors and professional organizations with the most SMB- and partner-friendly solutions in the channel today.

Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and actions that require attention but might be placed on the back burner. But when alerts start stacking up and aren’t addressed promptly, important security concerns might go unnoticed and these can spiral into a data breach. The time to detect and respond to security incidents should be as short as possible to limit the time an attacker can carry out an attack.

Top 10 Software Deployment Tools for 2022

Approaching any finish line in life can be exciting yet stressful. This holds especially true in software deployment. The deployment phase is the final phase of the software development life cycle (SDLC) which puts the software into production. After a project team completes their planning, designing, and testing of a software product, the product is ready to go live.

5 Misconceptions About API Security Testing for Mobile

The use of Application Programming Interface has skyrocketed with the rapid adoption of cloud, web, and mobile apps. Accordingly, API security testing has had to move into a completely different phase owing to the complexity as well as time and resource limitations. API testing involves testing the APIs directly, including their functionality, reliability, performance, and security.

The evolution of Zero Trust with AT&T: the ZTNA 2.0 advantage

This blog was jointly written with Kumar Ramachandran, Senior Vice President, Palo Alto Networks Most people can recall a time when computers were pieces of equipment that remained in a fixed location. Because of this, security was less of an issue outside of an organization's own walls. That all changed when laptop computers and mobile devices ushered in the era of the mobile workforce.

Mentoring in cybersecurity | Cybersecurity Sessions #10 with Gabrielle Botbol

Mentoring is essential to closing the cybersecurity skills gap, especially in realizing the potential of people from underrepresented communities. In recent years many newcomers to cyber have been mentored by Gabrielle Botbol. Since teaching herself how to be a pentester, she has become recognized as one of Canada’s top 20 women in cybersecurity. Andy Still finds out how Gabrielle entered the world of cybersecurity after leaving another vocation, and how she is helping the next generation of women and underrepresented communities follow her ‘six steps to becoming a pentester’.