The Latest Barracuda News
Product and Solution Information, Press Releases, Announcements
Defenses against weak or leaked user credentials
Like a burglar walking through a neighborhood checking doors and windows, attackers constantly scan the internet to find systems they can reach. Upon finding them, they look for low-hanging fruit — weaknesses that might gain them access, such as weak or leaked user credentials, unpatched vulnerabilities, or misconfigurations.
Securing digital business transformation projects will require lower compliance costs
Many IT teams are now officially between a rock and a hard place when it comes to digital business transformation and cybersecurity. In the wake of the COVID-19 pandemic, organizations are turning nascent digital business transformation initiatives into full-fledged business continuity strategies. Those efforts are requiring IT teams to accelerate the rate at which new applications are being deployed, mainly in cloud computing environments. The assumption is the cloud is both more resilient and more secure than an existing on-premises IT environment.
Network security posture management: A paradigm shift in the cloud
I believe this can be attributed to a lack of expertise and a shortage of resources. Network administrators who have worked primarily with network security on-premises may simply lack the training to deploy a cloud-first strategy for the workloads and applications being moved to the cloud. As a result, they deploy what they understand, and ultimately create friction and anti-patterns in the cloud. This can leave security and performance gaps that are difficult to identify without the right expertise.
Cyberattacks aimed at healthcare providers in wake of COVID-19 increase sharply
The data that nurses and doctors are relying on to save lives is under constant attack. A recent report from CrowdStrike, a provider of endpoint detection software, finds that intrusions impacting healthcare organizations doubled from the fourth quarter of 2019 to the first quarter of 2020.
Zoombombing provides teachable moment for cybersecurity teams
There are, of course, ways to better secure these meetings by requiring passwords and checking identities of individuals before they are allowed to join a video call. Organizations that make use of these platforms can also make use of identity and access management (IAM) tools and multi-factor access controls to restrict who can access a conference call.
Keep remote learners safe with Barracuda web security
Instructors and parents will want all of their young learners to be able to access online resources without encountering harmful material like adult content or malware-infected sites. Most modern browsers and operating systems provide some level of parental control to block adult content, and endpoint security/antivirus can help stop an infected website from installing malware on a student’s computer.
Barracuda recognized in Forrester Wave: Web Application Firewalls, Q1
Forrester’s detailed analysis of products and services says WAF customers should look for providers that:
New survey indicates security is the top concern restricting faster public cloud adoption
CAMPBELL, Calif., Feb. 20, 2020 -
Barracuda WAF is now available for Nutanix AHV
We are excited to announce that the Barracuda Web Application Firewall (WAF) is now available for Nutanix AHV. This means that that third-party hypervisors are no longer necessary to deploy a WAF Vx in the Nutanix environment. The Barracuda WAF can be deployed to the Nutanix AHV native Acropolis hypervisor via direct upload or inclusion in the Prism image repository. This creates more options and flexibility for infrastructure designers and helps them to provide cohesive design and operational symmetry throughout the organization.