Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tutorial: Get Started with Aliases and Exceptions Import

In this WatchGuard Support video, you'll learn how to import aliases and exceptions from a local-managed Firebox configuration file to a cloud-managed Firebox and Firebox templates in WatchGuard Cloud. Includes the import requirements, limitations and handling of duplicate entries.

The Principle of Least Privilege Explained (with Best Practices)

Granting users with authorization to access sensitive business information means that you rely on them to adopt cybersecurity best practices. This trust is violated when a disgruntled employee acts maliciously and leaks sensitive information. What’s more concerning — the same violation is also possible when users unwittingly fall prey to social engineering attacks, zero-day exploits or vulnerabilities that remain unpatched in your IT networks.

Understanding Process and Practice: What Sets Them Apart?

When pursuing success in business or other endeavors, two key concepts play a crucial role: process and practice. While some argue that process and practice are interchangeable, in reality, they're vastly different. But how do we use process and practice to become more efficient and successful? Is one of them more crucial than the other? Can you do one without the other? To answer these questions, we’ll dive deeper into process and practice and how to apply both.

Security Awareness 101: Creating a Compelling Security Awareness Program

There is no downside for an organization to have a security awareness program in place. It may not be 100% effective in stopping workers from making an error and causing a cyber incident, but like any preventative endeavor such a program can reduce the possibility of a disastrous cyber incident from occurring. An organization’s staff is on the front line when it comes to defending their place of work. Kind of a human firewall, if you will.

How to secure Kubernetes workloads using Calico DNS Security Policy

In my previous blog on Kubernetes security foundations, we discussed the growing adoption of cloud-native applications and the security challenges they present. We highlighted the limitations of traditional network firewalls in securing these applications and emphasized the importance of implementing cloud-native security policies to protect network traffic effectively.

The Art of Reducing Security Debt In 3 Key Steps

In the ever-evolving landscape of digital threats and cybersecurity challenges, organizations face a significant burden known as security debt. Just like financial debt, security debt accrues when organizations compromise security measures in favor of convenience, speed, or cost-cutting measures. Over time, this accumulated debt can pose serious risks to the organization's data, reputation, and overall stability.

Next-Generation Firewalls: A comprehensive guide for network security modernization

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The terms computer security, information security and cybersecurity were practically non-existent in the 1980s, but believe it or not, firewalls have existed in some form since that time.

Managing Cyber Risk in the Insurance Supply Chain

This week in London, SecurityScorecard hosted a roundtable discussion on cyber risk in the insurance supply chain. Keynote speaker Santosh Pandit, head of Cybersecurity at the Bank of England, shared his insights with 20 London-based insurers on managing cyber risk in the financial sector and the latest regulatory initiatives that may impact the insurance industry.