Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

WatchGuard: Defending Against Cyber Dystopia: 2022 Security Predictions

Every year, the WatchGuard Threat Lab team likes to dust off the crystal ball and predict the way cyber threats and information security will evolve going forward. Though we base our forecasts on quantifiable trends we've seen in the past, we also take the opportunity to extrapolate the more futuristic and dystopian cyber outcomes that might occur if attackers were left unchecked. In the end, our goal is to share how defenders must adjust to ensure we avoid the worst outcomes.

WatchGuard: Top Security Threats Worldwide: Q3 2021

Join WatchGuard CSO Corey Nachreiner and Security Operations Manager Marc Laliberte as they discuss key findings from the latest Internet Security Report from the WatchGuard Threat Lab. Fueled by the Firebox Feed, threat intelligence gathered from WatchGuard Firebox customers who have opted-in to sharing adversarial data, the report highlights the latest malware, network attacks and malicious domains targeting small and midmarket enterprises.

WatchGuard: The Importance of Firewalls in a Unified Security Platform

As our users continue to connect from remote locations, it may seem as if the core network protections provided by a firewall are less important. No matter where your users connect, effective protection for your organization requires extending the capabilities of the network beyond your traditional perimeter. Join Stephen Helm on February 15, 2022 to learn how integrating your firewall into a larger Unified Security Platform can improve accuracy, reduce time to detection, and keep your organizations safe from attacks that exploit remote connectivity.

Netskope: Securing Enterprise Perimeters through a Cloud-native, Data- centric Approach

Security teams today face a daunting task. They must secure an exponentially increasing number of perimeters across their network by accounting for managed and unmanaged cloud applications, protecting data that is moving off-premises and accessed by partners and other third parties at an accelerated rate, and controlling user access that increasingly comes from outside of the main campus across a multitude of devices.

Netskope: Through the Lens of a CISO:A Look at Cloud Adoption and Its Impact on Security Transformation

Pulling from their years of experience as CISO's, please join James Christiansen and Nate Smolenski for a fireside chat about security transformation. In this chat, they will explore the important topics around the evolution and impact of cloud adoption on continuously evolving security organizations.

Netskope: Is it Time to Retire Your Remote Access VPN?

Working outside of the traditional office environment has become a cultural norm, with recognised benefits to employers including higher productivity, cost savings, and greater employee engagement and satisfaction. But organisations are typically struggling with providing remote workers with secure access to their private applications. While user mobility has flourished, cloud application use has exploded, network perimeters have dissolved - outdated remote access VPNs are still used to give employees access to apps in the data center and public cloud. Zero Trust Network Access (ZTNA) isn't new, but recently its significance has been elevated by its inclusion in Gartner's future vision of a cloud-delivered Secure Access Service Edge (SASE), so is it time to retire your VPNs?

Netskope Threat Briefing Cloud, Collaboration and Coronavirus - How Cybercriminals Use a Crisis to Target Your Business

Can't make it? Register anyway and we'll send you the recording. Threat expert, Paolo Passeri, and his Netskope colleagues share what today's cloud-enabled threats look like - and what it takes to stop them. Join for live demonstrations of several cloud-enabled threats, and a discussion around cloud, collaboration, coronavirus and cybercriminals... Cloud: Highly available, highly scalable - cloud apps provide the perfect solution to collaboration while working from home. But cloud also provides the perfect platform for orchestrating attacks.