Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Fireblocks' new Browser Extension simplifies on-chain experience

Today, we are excited to announce our enhanced Browser Extension, providing seamless connectivity to dApps on over 30 EVM blockchains – with the security of Fireblocks MPC-CMP, Governance and Policy Engine, and DeFi threat detection capabilities. The new Browser Extension leverages components from Rabby Wallet open source, enabling customers to enjoy Fireblocks security with the intuitive Rabby interface and expansive dApp connectivity.

Find Your Best Fit: Solving the Cybersecurity Framework Puzzle

We recently presented the webcast "Find Your Best Fit, Solving the Cybersecurity Framework Puzzle." Tyler Reguly, who is a senior manager of research and development at Fortra and a former professor at his alma mater, Fanshawe College, served as the host. Tyler offered his wisdom about integrating CIS Controls into a comprehensive cybersecurity plan for your organization.

Supercharge domain discovery with AI-powered External Attack Surface Management (EASM)

Modern organizations have sprawling attacks surfaces of known and unknown assets that grow each day. This means understanding and managing your external attack surface is more crucial than ever. But with the vast number of digital assets that organizations need to monitor, accurately identifying every component of your attack surface can seem overwhelming – which is why many turn to External Attack Surface Management (EASM).

Understanding Cloud Misconfiguration: Risks, Prevention, and Solutions

Cloud configuration remains a critical priority for organizations leveraging cloud services, which today, is practically universal. Cloud misconfigurations, in turn, can lead to security vulnerabilities and compliance issues. That’s why it’s more important than ever for organizations to get this fundamental security function right. Here’s what you need to know about cloud misconfiguration, from what causes it to how to remediate it when it does occur. ‍

What is a Cyber Advisor?

Certifications are a great way for customers to get confidence that the company they’re trusting with their cyber security is up to the job. So, when the Cyber Advisor scheme was launched, we thought it was a great opportunity to invest in our staff. In this Q&A blog we’ll look at what a Cyber Advisor is, what it means for your business, and what it means to our staff – as we talk to Bulletproof’s first Cyber Advisor, Jemma Aldridge.

Understanding DORA: The New European Regulation

With the rise in cyberattacks, robust measures are essential to reduce attack surfaces and respond swiftly to threats. Compliance with regulations like the Digital Operational Resilience Act (DORA) is crucial to prevent severe penalties and ensure business continuity. This blog post looks at DORA and introduces our white paper about this important new European regulation.

Insider Risk Management Strategies to Protect Sensitive Data

Cybersecurity methods are usually focused on protecting an organization from external risk factors, but insider attacks can be just as dangerous and costly as those that originate outside an organization. In fact, insider threats pose serious security risks because they typically involve individuals with authorized access to the organization’s systems, data, or networks.

Advancing Threat Intelligence: JA4 fingerprints and inter-request signals

For many years, Cloudflare has used advanced fingerprinting techniques to help block online threats, in products like our DDoS engine, our WAF, and Bot Management. For the purposes of Bot Management, fingerprinting characteristic elements of client software help us quickly identify what kind of software is making an HTTP request. It’s an efficient and accurate way to differentiate a browser from a Python script, while preserving user privacy.

DORA's Reach: How UK ICT Service Providers Are Affected

The Digital Operational Resilience Act (DORA) is set to reshape the landscape of financial services in the European Union. But its impact extends beyond EU borders, particularly affecting UK-based Information and Communication Technology (ICT) service providers. Let’s explore how DORA might influence these providers and what steps they should consider taking.

Why DCAP is Essential for Modern Data Security (A Closer Look)

Almost every company has a system for organizing file storage, which employees use regularly. Streamlining data storage in a corporate environment is not just about improving business processes; it is also about ensuring security. It is challenging to protect data if you do not know where it is stored, what it contains, its value, who owns it, who has access to it, and what its most significant threats are. This is where Data-Centric Audit and Protection (DCAP) systems come into play.