Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing parlay, a tool for enriching SBOMs

The increasing adoption of software bill of materials (SBOM) standards are starting to drive better interoperability between security tools. The NTIA’s work on defining a minimum set of elements for an SBOM was a key part of that, especially with multiple formats like CycloneDX and SPDX in widespread use. But with work on SPDX 3.0 and CycloneDX 1.5 progressing, there are lots of things we can do with the SBOM formats beyond the minimum elements.

What can you do with an enriched SBOM? A parlay quickstart guide

We just released parlay, a new open source tool that can enrich SBOMs with additional information. You can read more in the announcement blog post. In that post, we briefly mentioned why this is important for decision-making based on SBOM data, but thought a few quick examples might be interesting. parlay can add a lot of extra information to an SBOM, and we can use that information to write more powerful policies.

Navigating the Turbulent Waters of Cybersecurity: Nationalism, Economics & AI

Welcome to the Razorwire podcast. In this episode, I delve into the turbulent waters of cyber security with Razorwire favourite, Oliver Rochford. We'll be discussing a range of topics that are currently shaping the industry, including economic challenges, nationalism and the continuing impact of the pandemic. We'll also be exploring the use of acronyms, consolidation and rationalisation in the vendor space, and the development and potential dangers of AI. But that's not all! We'll also be taking a closer look at the weaponisation of security, the need for active security and moving target defence, and the potential for mergers and acquisitions in the industry.

Attack Surface Intelligence (ASI) Data Updates: Enhancing Threat Research Capabilities

In the ever-evolving cybersecurity landscape, staying ahead of potential threats is crucial. Attack Surface Intelligence (ASI) is vital in identifying vulnerabilities and mitigating risks. This blog post will discuss the latest data updates in ASI and the exciting developments within our threat research group.

WatchGuard Wins Two Fortress Cyber Security Awards

We’re thrilled to share that Business Intelligence Group has named WatchGuard as a winner in the Organizational Excellence category and recognized WatchGuard CEO Prakash Panjwani with a prestigious Leadership Award at this year’s Fortress Cyber Security Awards! This annual program recognizes the top companies, executives, and products from around the world leading the charge in preparing, defending and responding to growing cybersecurity threats.

Coffee Talk with SURGe: the Interview Series featuring Scott Roberts

Join Mick Baccio and special guest Scott Roberts, head of threat research at Interpres Security for an interview about Scott's career journey, how he's seen cybersecurity evolve over time, and his essay featured in the SURGe team's new book, Bluenomicon: The Network Defender’s Compendium.

Streamline Co-editing Microsoft Documents with Egnyte

As part of our ongoing commitment to providing a seamless co-editing experience to Egnyte users, we have introduced new enhancements that enable Windows and Mac users to open any Microsoft Office-supported file such as Word, Excel, and PowerPoint, and start or join a co-editing session directly from the Microsoft Office App. Users can also co-edit in real time using the Egnyte Desktop, Online or Mobile versions.

Sysdig Enriched Process Trees, an Innovative Approach to Threat Detection

Discover how Sysdig Secure’s new Process Tree feature improves threat investigation. In order to speed up the investigation of security events, Sysdig Secure now includes a process tree showing the attack journey from user to process, including process lineage, container and host information, malicious user details, and impact. In Linux systems, a process tree refers to the hierarchical representation of running processes on a system. It depicts the parent-child relationship between processes all the way to the root.