Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

WatchGuard: Top Security Threats Worldwide Q2 2025

Join WatchGuard CSO Corey Nachreiner and Director of Security Operations Marc Laliberte as they discuss key findings from the WatchGuard Threat Lab's Q2 2025 Internet Security Report. They'll cover the latest malware and network attack trends targeting small and mid-sized enterprises and defensive tips you can take back to your organization to stay ahead of modern threat actor tactics. In this webinar, you'll learn.

GitGuardian: [Live Product Demo] GitGuardian Public Monitoring

About this event Developers leak MILLIONS of secrets (e.g., API keys, Cloud credentials, etc.) on GitHub every year. How do we know? We monitor public GitHub round the clock, 24/7, 365 days a year! Want to learn more but don't feel like jumping on a sales call? Look no further - our live product demo webinar is the best place to get started! Join us for a concise 20-minute live demo of our GitGuardian Public Monitoring solution with our two experts, Dwayne McDaniel & Jason Miller.

NAKIVO: New v11.1: Expanded Proxmox Support, Real-Time Replication, Disaster Recovery and MSP Direct Connect

How do you stop a multi-billion-dollar underground industry like ransomware and phishing services? You don't. What you can do is protect your data so that when the hackers come, you simply click "Recover". NAKIVO's upcoming v11.1 update aims to help businesses improve their defenses against growing threats with powerful new data protection and security features. Join us as we reveal the latest capabilities and explain their advantages against cyber attacks and other data loss events.

Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks

SquareX first discovered and disclosed Last Mile Reassembly attacks at DEF CON 32 last year, warning the security community of 20+ attacks that allow attackers to bypass all major SASE/SSE solutions and smuggle malware through the browser. Despite responsible disclosures to all major SASE/SSE providers, no vendor has made an official statement to warn its customers about the vulnerability in the past 13 months - until two weeks ago.

Introducing New-Scale Analytics - Analyst Workflow Demonstration

This video demonstration was produced for Exabeam Advanced Analytics customers who plan on upgrading to New-Scale Analytics. You'll learn what makes New-Scale Analytics such a powerful new solution for threat detection, investigation, and response (TDIR). LEARN MORE: Subscribe for more product demos and cybersecurity insights!

Edge IoT Security: Securing Devices for Modern Enterprises

Enterprises are rapidly shifting toward edge computing to support real-time decision-making, reduce latency, and enable smarter connected operations. By processing data closer to where it is generated — whether in factories, vehicles, hospitals, or energy grids — edge computing reduces reliance on centralised data centres and cloud platforms. Secure communications are essential to ensure the integrity and privacy of data as it flows between devices and infrastructure at the network edge.

Shadow IT vs. Insider Threat: What's the Difference?

Consider two scenarios. In one, a marketing manager uses their personal cloud storage to share a large file, bypassing the slow corporate system to meet a tight deadline. In another, a sales executive uses the company-approved CRM to download the entire client list before joining a competitor. Both actions create significant risk, but they are not the same problem. The first is a classic case of shadow IT, often driven by a desire for efficiency.

AI-Powered Protection, Profitable Margins: Why VARs Are Switching to AppTrana WAAP

Globally, the VAR market for IT products is projected to exceed USD 11.8 billion in 2024 and grow at a CAGR of 7.5%, potentially doubling by 2033. Within security software, where overall market spending is expected to surpass USD 200 billion, VARs(Value Added Resellers) play an outsized role by packaging products with services that help enterprises implement, manage, and get measurable outcomes from their technology investments.

WAF Bypass Explained - Risks, Examples, and Prevention

Web Application Firewalls (WAFs) and Web Application & API Protection (WAAP) platforms are designed to stop attacks before they reach your applications. Yet many organizations fall into a dangerous comfort zone. They deploy a WAF, leave it in monitor mode for months, or configure environments in ways that allow attackers to bypass the WAF entirely and reach origin servers directly.