Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2024

10 Dimensions of Python Static Analysis

Python static analysis, also known as "linting", is a crucial aspect of software development. It involves inspecting your Python code without running it to identify potential bugs, programming errors, stylistic issues, or non-adhering patterns to predefined coding standards. It also helps identify vulnerabilities early in the development process, reducing the chances of deploying insecure code into production.

IP Address Alert Investigations: Correlating and Mapping with MITRE ATT&CK

An Internet Protocol (IP) address is the digital equivalent of your home address. Your home has a unique identification number that gives information about your physical geographic location, like road, city, state, and country. An IP address provides similar information about the people and devices connected to a network.

How to de-risk patching third party software packages

There are several steps your organization must take to protect itself from potentially exploitable packages. First, you’ll need to carefully review and triage the package vulnerabilities that present risk to your organization, then you’ll need to patch each one. Patching a package may sound easy, but doing so without breaking your product can be tricky. ‍ Before patching, you may review the changelog between versions. Opening the changelog, however, could further the patch dread.

Looking for a Job in Cyber? Tips and Advice From the Pros

A career in cybersecurity can be rewarding, challenging, and, frankly, lucrative. But it's not the easiest industry to break into: the skills required for a cybersecurity role are both niche and specific, the bar for entry is relatively high, and there are very few entry-level jobs available. But don't be disheartened. The cybersecurity industry is crying out for fresh talent. With hard work, a little luck, and the right advice, you can set yourself up for a long and satisfying career in cybersecurity.

Nightfall AI vs. Google DLP

In today’s cloud-based work environments, it’s all too easy for assets with sensitive data like PII, PCI, PHI, secrets, and intellectual property (IP) to be sprawled across the enterprise tech stack. With the skyrocketing costs of data breaches, one sprawled secret can cost organizations an average of $4.45 million. This is where Data Leak Prevention (DLP) solutions come in to limit secret sprawl, prevent data leaks, and ensure continuous compliance with leading standards.

Key Learnings from the Disney Breach: 5 Ways to Stop Secret Sprawl

Do you have secrets sprawled across your tech stack? The recent Disney breach is as good a reminder as any to check, because it’s likely that you do. But first, let’s take a closer look at the Disney breach to understand what may have gone wrong, and how you can prevent a similar breach from happening to your business.

HTX Integrates Fireblocks Off Exchange

HTX is the latest global exchange to integrate with Fireblocks Off Exchange, a first-of-its-kind solution that enables trading firms and asset managers to mitigate counterparty risk while trading on centralized exchanges. Through integrating with Off Exchange, HTX looks to strengthen their digital asset security, streamline global compliance operations, and create a better virtual asset trading experience for their users.

Crypto Exchange Bybit Integrates Fireblocks Off Exchange

Fireblocks Off Exchange enables businesses across the world to trade on centralized exchanges without introducing counterparty risk. Today, we’re proud to share that Bybit is the newest exchange to integrate with Off Exchange. Bybit, a crypto exchange ranked the second-largest in the world, joins Deribit, with further integrations to follow. These include BIT, Bitget, Coinhako, Gate.io, One Trading, and OKX.

WatchGuard Wins 2024 ChannelVision Visionary Spotlight Award

We’re excited to share that ChannelVision Magazine has recognized WatchGuard Technologies with a 2024 Visionary Spotlight Award for Cybersecurity in the program’s Business Technology category! The annual award program honors top industry players that have significantly advanced their channel and technological investments over the last year.

No summer scares: 5 tips on how to keep your business cybersecure

Guiding employees' digital behaviors is key to avoiding potential cybersecurity breaches. However, remote work during summer weeks may disrupt normal routines and change the location of digital assets, leaving companies open to vulnerabilities. According to our latest Internet Security Report, malware detections on endpoints increased by more than 75% during the first months of the year.

Why the World's Top MSSPs are Ditching Legacy SOAR for Hyperautomation

Managed Security Service Providers (MSSPs), desperate to automate repetitive tasks, initially turned to SOAR to reduce their workload and improve threat response times. Unfortunately, legacy SOAR tools still face scalability, flexibility, and integration challenges. As the complexity and volume of cyber threats continue to grow, the limitations of legacy SOAR have become more apparent, necessitating the move towards more advanced automation technologies like Torq Hyperautomation.

Fortressing the Legal Frontier: Why SASE is Essential for Law Firms in the Age of Cyber Warfare

Guest blog by Jaye Tillson, Field CTO, Distinguished Technologist, HPE Aruba Networking The legal profession has long been a custodian for a significant of sensitive data. From mergers and acquisitions to intellectual property disputes, law firms hold the keys to a kingdom of confidential client information. However, in the digital age, this crown jewel has become a prime target for cybercriminals.