This week on the podcast we talk Zero-Trust. What is it? How do you implement it? And why should all IT professionals work towards updating their networks to this security architecture? We'll answer all that and more after a quick Kaseya update and a security memorandum from the White House. … [Read more...]
Search Results for: zero-trust
Identity Management and Risk Authentication: Core Technologies to Achieve Zero-Trust Security
In a dynamic world, where user mobility impacts security almost 100% of the time, multi-factor authentication (MFA) has become imperative and key to deploying a zero-trust network. Why? • Users are connecting to company resources from different, unprotected networks • Working hours have become more flexible, so they could be working from early hours to late evenings • … [Read more...]
Biden Orders Massive Overhaul of Federal Agency Security
In response to recent cybersecurity incidences like the SolarWinds breach, Microsoft Exchange Server vulnerabilities, and the Colonial Pipeline ransomware attack, President Biden signed an executive order to increase the cybersecurity stance of the federal government and all civilian agencies it contracts with. The 34-page executive order implements minimum security … [Read more...]
Is EMOTET Really Gone Forever?
The answer to that question still remains open, but we expect it might return in some form or fashion. Yes, the takedown of EMOTET was successful, but anyone in the world of cybersecurity will tell you that malware has a habit of resurfacing in clever and unexpected ways. Therefore, the same could hold true for the EMOTET botnet as well. What is EMOTET? EMOTET, one of the … [Read more...]
Analyzing a Fileless Malware Loader
Thanks to WatchGuard’s Panda Adaptive Defense 360 zero-trust service, WatchGuard Threat Lab was able to identify and stop a sophisticated fileless malware loader before execution on the victim’s computer. Upon further detailed analysis by our attestation team, we identified several recent browser vulnerabilities that the malware targeted as part of its exploit chain. Malware … [Read more...]