Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Enable Logging: Secure Cloud-native Development Series

Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the second part of the series, and it will teach you how and why to enable logging from the start. We’re going to talk about enabling logging (cloud logging, to be specific). What’s the difference? Not much, other than the fact that it’s another managed service integrated with the tools we should already be utilizing.

The Role of Software in Vendor Risk Management Products

In recent years, vendor risk management (VRM) has become a complicated practice as businesses aim to scale and manage potentially hundreds or thousands of vendors. With more vendors, cybersecurity risk is introduced, necessitating software and other digital solutions to adequately manage these vendors. The role of software in vendor risk management products is more important than ever now and moving forward.

LUKB taps Fireblocks to build infrastructure for new crypto trading and custody product

Luzerner Kantonalbank (LUKB), the leading bank in the Swiss canton of Lucerne, uses Fireblocks to provide the infrastructure for this new digital asset initiative. Read the blog and watch the video. In an era where digital assets are reshaping the landscape of financial services, Luzerner Kantonalbank (LUKB), the leading bank in the Swiss canton of Lucerne, is at the forefront of innovation.

TMX Finance Suffers a Breach Exposing Nearly 5 Million

TMX Finance and related companies are all involved in crisis loans and emergency lending programs. The companies handle financial data for a huge number of individuals throughout the United States, and the different individuals involved with the company could be at risk for this reason. We recently learned that TMX Finance suffered from a data breach that exposed data for nearly 5 million people. News of the breach was just released, but victims may have been exposed for months now.

Why Cybersecurity Is So Valuable for Small Businesses

Cybersecurity is extremely valuable for small businesses because it keeps their data secure, improves employee productivity, helps protect their reputation, aids in legal and regulatory compliance, and is cost-effective. Read on to learn more about the value of cybersecurity for small businesses and cybersecurity best practices your business can start implementing today.

The Case for Single-Tenant SaaS for IGA

More and more organizations are moving towards a cloud-first strategy where they look to move their on-premises applications to SaaS offerings. This is especially true for customers looking to streamline their on-premises Identity Governance and Administration (IGA) application via a move to the Cloud.

NACL best practices: How to combine security groups with network ACLs effectively

Like all modern cloud providers, Amazon adopts the shared responsibility model for cloud security. Amazon guarantees secure infrastructure for Amazon Web Services, while AWS users are responsible for maintaining secure configurations. That requires using multiple AWS services and tools to manage traffic.

Host-based firewalls vs. network-based firewalls for network security?

Before your organization can move business applications to the cloud, it must deploy network security solutions that can reliably block cybercrime and malware. Firewalls are essential cybersecurity tools that protect network traffic against threat actors. There are many different types of firewalls available, but put the same basic principles in action.

Cloud-Centric Permission Management: A Conversation with Ron Nissim

In this conversation, Phillip Wylie is joined by Ron Nissim, the CEO of Entitle. They delve into the dynamic world of authentication and privilege access management, exploring the significance of automation and simplification in securing our digital landscape. They dive into the future of authorization and how innovative solutions like Entitle are reshaping the way we protect our data and systems.

How a Cloud Management Platform like OptiXdashboard Streamlines Cloud Ops

While threats of ransomware make the headlines week after week, the ability to ensure the security of data remains top of mind for enterprise leaders in every industry. While many organizations are migrating to the cloud, comprehensive control and analysis remain a priority even after leaving behind on-premise storage.