Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How To Protect Your Data if Your Phone Is Lost or Stolen

If your phone is ever lost or stolen, your data could be at risk of being compromised. One of the main ways your stored data could be in danger is if you have a weak passcode, such as 0000 or 1234. If the person who found or stole your phone could guess your passcode, your data would become compromised. Read below to learn more about how to protect your phone when it’s lost or stolen and how to keep your phone’s data safe.

Windows Spotlight - Configurations for Your Lock Screen

Windows Spotlight automatically displays a variety of high-resolution lock screen images. These come from various sources, including Bing searches, professional photographers, and Microsoft’s own collection. It's available on Windows Enterprise and Education editions only. The images encompass a variety of subjects from nature scenes, cityscapes, and architectural marvels to keep a fresh login screen.

UK Election - The Hacktivism Perspective

The UK General Election marks a monumental time in UK politics. There has been a lot of internal tension regarding the future of the Conservatives, with a large majority of individuals voting to ensure that the party did not continue its 14 years in power. On 5 July 2024, Labour won the General Election in a major landslide victory for the party, putting them in power for the first time since 2010.

Multi-Cloud Security: Proven Methods for Safeguarding Data

As organizations increasingly adopt diverse cloud services to meet their varying computational and storage needs, multi-cloud security emerges as a critical concern. “In 2024, a majority of organizations (78%) are opting for hybrid and multi-cloud strategies. Of those organizations, 43% use a hybrid of cloud and on-premises infrastructure, and 35% have a multi-cloud strategy,” according to the 2024 Fortinet Cloud Security Report.

Making Sense of NIS 2: Adopt a Cybersecurity Blueprint like NIST to Set Your House in Order

In 2023, the European cybersecurity landscape painted a concerning picture. According to a report in detection, response, and mitigation further emphasized that enterprise cybersecurity implementations were falling short.

9 Social Engineering Attack Examples to Watch Out For

Social engineering attacks have become increasingly sophisticated and diverse in today's digital-first world. Attackers have a toolbox full of tactics to manipulate individuals and organizations into revealing sensitive information or granting unauthorized access. By understanding the different types of social engineering attacks, you can better protect yourself against these manipulative techniques.

How to Create a Ransomware Recovery Plan & Prevent Attacks

Ransomware isn’t just a threat—it’s a harsh reality facing IT professionals in many industries. And while Kubernetes and OpenShift are powerful platforms for modern infrastructure, they introduce unique complexities that cybercriminals can exploit. The fallout from a successful attack is well documented: significant financial loss, operational downtime, and potential damage to your organization’s reputation.

How to evaluate AI features in workflow automation platforms

If you’ve been paying attention to the latest AI product releases or evaluating AI tools for your teams, you’ll probably have noticed how difficult it is to distinguish between hype and reality. Vendors are under an enormous amount of pressure to deliver AI features, and, as a result, many of these new tools feel rushed and fragile, and simply aren’t capable of solving important, real-world problems.

Guide to SWIFT CSCF (Customer Security Controls Framework)

The SWIFT Customer Security Controls Framework (CSCF) is a key global cybersecurity framework that provides recommended and mandatory security controls for banking institutions that use the SWIFT banking system. The framework is designed to help financial institutions improve their cyber resilience and ensure that participants within the SWIFT network adhere to a stringent set of security compliance standards. Find out how UpGuard helps the financial services industry meet compliance standards >

Support for AWS Nitro Enclaves on Fireblocks

At Fireblocks, we know that our customers employ a variety of different cloud configurations for their own internal systems. That’s why we’re excited to announce that Fireblocks now supports Amazon Web Services (AWS) Nitro Enclaves. With this new development, Fireblocks customers building products on AWS can now utilize Nitro Enclaves to run their Fireblocks API Co-Signer.