WatchGuard
![tech](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112234/tech-400x200.jpg)
New infosec products of the week: June 12, 2020
Qualys Remote Endpoint Protection gets malware detection, free for 60 days Powered by the Qualys Platform and Cloud Agent, malware detection in Remote Endpoint Protection uses …
WatchGuard Firebox T Series firewalls: Heightened HTTPS throughput, security services, SD-WAN
WatchGuard announced the release of new Firebox T Series tabletop firewall appliances. WatchGuard’s new T20, T40 and T80 Fireboxes equip small, home and midsize office …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/29153125/encryption-1-400x200.jpg)
Why building backdoors into encryption won’t make us safer
For much of the last decade, technology companies have been in an uphill battle to save encryption, a battle that has seen an increasing number of skirmishes that tech …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Evasive malware increasing, evading signature-based antivirus solutions
Evasive malware has grown to record high levels, with over two-thirds of malware detected by WatchGuard in Q4 2019 evading signature-based antivirus solutions. This is a …
WatchGuard acquires Panda Security to expand endpoint capabilities
WatchGuard Technologies, a leading global provider of network security and intelligence, secure Wi-Fi and multi-factor authentication, announced that it has entered into a …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
What the government infosec landscape will look this year
The information security landscape seems to evolve at a faster clip each year. The deluge of ever-changing threats, attack techniques and new breaches making headlines can be …
![vectors](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103046/vectors-400x200.jpeg)
As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections
Amid significant increases in both malware and network attacks, multiple Apache Struts vulnerabilities – including one used in the devastating Equifax data breach – appeared …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095922/network1-400x200.jpg)
How DNS filtering works and why businesses need it
The Domain Name System (DNS) is a cornerstone of the internet. DNS servers connect URL names that humans can read to unique Internet Protocol (IP) addresses that web browsers …
![Adaptiva Evolve VM](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092719/adaptiva-evolve-vm-400x200.jpg)
New infosec products of the week: November 8, 2019
Waterfall for IDS: Hardware-enforced security between OT networks and IDS sensors Waterfall for IDS provides hardware-enforced security that deploys transparently between OT …
WatchGuard launches new cloud-managed outdoor Wi-Fi access point
WatchGuard, a global leader in network security and intelligence, secure Wi-Fi, and multi-factor authentication, announced the release of a new cloud-managed outdoor Wi-Fi …
![binary bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112818/binary-bomb-400x200.jpg)
Year-over-year malware volume increased by 64%
The most common domains attackers use to host malware and launch phishing attacks include several subdomains of legitimate sites and Content Delivery Networks (CDNs) such as …
![AWS](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093159/aws1-400x200.jpg)
How data breaches forced Amazon to update S3 bucket security
Amazon launched its Simple Storage Service (better known as S3) back in 2006 as a platform for storing just about any type of data under the sun. Since then, S3 buckets have …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD