Information security
FIDO2: What Every C-Level Needs to Know & Why Your Business Needs It
Cybersecurity News & Trends
SonicWall Capture ATP Receives Perfect Score in ICSA Labs ATD Certification
Improving Alert Triage process using Swimlane’s SOAR platform with Threat Intelligence Integration
Improving Alert Triage process using Swimlane’s SOAR platform with Threat Intelligence Integration
Cybersecurity News & Trends
A Look Back: SonicWall Reflects on its 42nd CRN Award
Why SMS Two Factor Authentication Isn’t Enough. And What You Should Use Instead
Cybercrime on Campus: How Education Became Attackers’ Biggest Target
A Guide To PSD2 & SCA and How It Will Affect Your Business
Cybersecurity News & Trends
Understanding the Difference Between Azure Firewall Services and SonicWall NSv
Transmit Security Voted #2 in Calcalist’s Top 50 Most Promising Startups in Israel
Clear and Present Danger: Why Cybersecurity is More Critical than Ever
Emotet and Trickbot: The Battle of the Botnets
Improving Alert Triage process using Swimlane’s SOAR platform with Threat Intelligence Integration
Cybersecurity News & Trends
Improving Alert Triage process using Swimlane’s SOAR platform with Threat Intelligence Integration
The Definitive Guide to SASE
Locked Accounts: Why Complex Authentication Methods Are Hurting Your Customers & Business
Cybersecurity News & Trends
SonicWall Named Silver Partner of the Year by CDW Canada
Expanding the Trophy Case: SonicWall Attains 5-Star Rating in 2021 CRN Partner Program Guide
Why Password Sharing Kills Your Bottom Line
Does Your Network Need a Watchman?
La vostra rete ha bisogno di un buttafuori?
Cybersecurity News & Trends
Fast Incident Response (FIR) Integration with Threat Intelligence Management Platform (IMP)
Accelerated SonicWall Portfolio Expansion Delivers Enterprise-Grade Protection, Lower TCO
Capture Client 3.6: Big Sur, But Safer
New SonicWall NSa 3700: The Latest Next-Generation Firewall for Medium Enterprises
Announcing Wireless Network Manager for Unified Wired and Wireless Management
NSM On-Prem vs. NSM SaaS: Which Is Best for You?
CSa 1.2: Advanced, Closed-Network Threat Protection
The 8 Biggest Issues in CIAM Today
Cybersecurity News & Trends
Fast Incident Response (FIR) Integration with Threat Intelligence Management Platform (IMP)
New! New! New! IDeas the Webinar Series by Transmit Security
Punto di non ritorno: il nuovo rapporto di SonicWall registra un’impennata delle minacce e un cambio di paradigma storico
Netflix Is Onto Users Who Share Their Passwords
Hafnium Uses Zero-Day Vulnerabilities Against Microsoft Exchange: What to Do Next
Tipping Point: SonicWall Exposes Soaring Threat Levels, Historic Power Shifts In New Report
Cybersecurity News & Trends
Deploying FIDO 2.0: User Interaction Models and Implementation Challenges
Cybersecurity News & Trends
SonicWall NSa 2700 vs. Fortinet FortiGate 100F
SonicWall Portfolio Racks Up 10 Industry-recognized Awards
Why FIDO2 is the Answer to Our Passwordless Security Prayers
10 Reasons to Upgrade to the Latest SonicWall Gen 7 TZ Firewall
Cybersecurity News & Trends
Cybersecurity News & Trends
How can you speed up Incident Response on ServiceNow for Automated Enrichment of security incidents using Threat Intelligence ?
Speed up Incident Response on ServiceNow
5 Ways to Keep your Remote Workforce Safe, Secure & Productive
Identity Portability: Is This the End of Usability vs. Security?
Three SonicWall Executives Named to Annual CRN 2021 Channel Chiefs List
[Infographic] The 8 Biggest Issues in CIAM Today
Transmit Security Proudly Joins FIDO Alliance as a Board Member in Continuous Effort to Transform Identity Experiences
IBM QRadar Use Cases
Delivering End-to-End Threat Management with QRadar Integration
Passwords and The Evolution of Imperfect Authentication
Cybersecurity News & Trends
BindID: The Mobile Authenticator That’s Transforming the Identity Security Space
SonicWall CEO Talks Federal Cybersecurity, Resiliency and Ryuk
Cybersecurity News & Trends
New Year, New Product, New Website, New Look
How 2020 Shaped the Year of Cybersecurity
Cybersecurity News & Trends
Massive Supply-Chain Attack Targets SolarWinds Orion Platform
Cybersecurity News & Trends
SonicWall Sweeps Six Industry Awards, Including Grand Trophy, at Network Product Guide 2020 IT World Awards
SonicWall Celebrates 20 Years of Delivering World-Class Cybersecurity Solutions in Mexico
SMA100 Series Cloud Management and Reporting 1.0 Delivers Simplicity and Visibility
Cybersecurity News & Trends
Transmit Security Honored as the Fastest Growing Company in 2020 by Deloitte
Is Microsoft Azure Sentinel your next Implementation? Learn how Loginsoft integrated Sentinel with data source
Loginsoft builds expertise in integrating Threat Intelligence source with ThreatQuotient’s Threat Intelligence Platform
Security Alert!! SOHO Devices are Susceptible to 5 new Vulnerabilities
Loginsoft builds expertise in integrating Threat Intelligence sources into ThreatConnect (SOAR) platform
How Osquery Works and How Osquery FIM benefits Security Researchers
Explicating the Concepts of Osquery
A New Approach to Accelerate Threat Detection
Threat Detection with SIGMA Rules
Osquery for SIEM
Source Integration with Anomali ThreatStream
Integration capability with MISP Open Source Threat Intelligence platform
Extending Splunk UI using Custom JS and CSS
Traverxec — HackTheBox Writeup
Driving the Diligence of Data Visualization
Shield your Firewall to Strive Against Sensitive Data Disclosure
IoT’ization – Sharpening the ‘Smart’ness of Digital World
Heap Overflow Vulnerabilities and Concerned Threats
Is your Firmware secured? – It’s time to shield the IoT Cyber Surveillance with Firmware Analysis
Zero Day Vulnerability – Research and Report!
Secure your Network by setting up a Honeypot
Securing email server in a Nutshell
Stack Buffer Overflow Vulnerabilities – A Serious Threat to the Cyber Applications
Securing AngularJS Applications
Introduction to Reverse Engineering and Radare2
Introduction to Common Gateway Interface and CGI vulnerabilities
Introduction to Heap Internals
Discovering Vulnerabilities with AFL Fuzzer
Memory Corruption Vulnerabilities
Why Is My Software Vulnerable?