Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The US Treasury Attack: Key Events and Security Implications

There’s a dark joke in cybersecurity: each year ends with an unwelcome holiday surprise—a major security incident. This timing isn’t random. Threat actors target this timing, knowing security teams operate with skeleton crews that impact detection, investigation and response times. It’s a calculated strategy that works reliably, year after year. And now there’s another holiday surprise to add to the list—the recent attack on the U.S. Treasury Department.

Enhancing Fund Tokenization Operations and Management with Fireblocks x Tokeny

Tokenization is gaining momentum in the financial world; more and more financial institutions recognize the impact it will have on how financial products are created, traded, and managed. It is estimated that the potential value of tokenized assets will reach about $16 trillion by 2030.

New Operating Models of Digital Asset Trading

‘Traditional’ equities trading has undergone massive transformation over centuries. The evolution of how trades are conducted reflects technological advancements, market demands, and the need for efficiency. From the establishment of stock exchanges to the emergence of electronic communication networks (ECNs), the journey from disruption to adoption paints a clear picture of the changing landscape.

Leveraging CrowdStrike Falcon Against Attacks Targeting Okta Environments

As more organizations move to software-as-a-service (SaaS), remote access to applications and data is concentrated among a smaller set of identity providers. These identity providers, such as Okta, must absorb growing volumes of credential-based attacks. Okta consistently reports high volumes of credential stuffing, password spraying and phishing attacks against its customers. Additionally, red teams are discovering new patterns of abuse relevant to Okta products.

How Vulnerability Assessments Help Identify and Address Security Weaknesses

A vulnerability assessment systematically evaluates the security of an organisation’s IT infrastructure, aiming to uncover potential flaws. This process not only identifies weaknesses but also provides a roadmap for addressing these vulnerabilities before they are exploited by malicious actors. Through a series of structured steps, including identification, classification, analysis, and remediation, organisations can significantly enhance their cyber security posture.

Information Security Risk Management: A Comprehensive Guide to Protecting Your Data

In an age where data breaches make headlines almost daily, safeguarding sensitive information has never been more crucial. The rapid advancement of technology has made our personal and professional data vulnerable, raising the stakes for effective security measures. Information Security Risk Management (ISRM) emerges as a necessary framework to defend against these escalating threats.

What Does The NIS2 Directive Mean for Cybersecurity in the EU?

With the growing cyberattacks threatening business and customer data, Chief Information Security Officers (CISO) are working to implement the NIS2 Directive into their organization to strengthen their digital security. NIS2 is mandatory for all medium-sized and large organizations within vital sectors in the EU.

AI-Driven Case Management Built for the Modern Security Team

Case management for modern SOCs can be a maze of endless alerts, overwhelming data, and intense pressure. Legacy solutions often exacerbate these issues with rigid workflows, limited automation capabilities, and a lack of real-time adaptability, leaving teams ill-equipped to handle the growing complexity of threats. The volume of cases, manual workflows, and processes leave analysts overwhelmed, exhausted, and struggling to keep pace.