Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The CIA Triad: Confidentiality, Integrity, and Availability

The confidentiality, integrity, and availability (CIA) triad is a critical concept in cybersecurity, including three fundamental principles that help protect information. Organizations seeking a starting point for developing an information security framework would benefit from the triad model.

Nightfall AI vs. Google DLP

In today’s cloud-based work environments, it’s all too easy for assets with sensitive data like PII, PCI, PHI, secrets, and intellectual property (IP) to be sprawled across the enterprise tech stack. With the skyrocketing costs of data breaches, one sprawled secret can cost organizations an average of $4.45 million. This is where Data Leak Prevention (DLP) solutions come in to limit secret sprawl, prevent data leaks, and ensure continuous compliance with leading standards.

One platform, complete protection: why data security is moving on from point solutions

As the world enters the AI Era, CISOs and CIOs are looking at data security with renewed interest and urgency. Instead of multiple overlapping yet disconnected tools, it’s time for one unified platform to trace and secure data wherever it goes.

Navigating Digital Nightmares: A Survivor's Battle Against Online Harassment

Technology can serve as a double-edged sword for women grappling with domestic abuse: while it has the potential to save lives, it also has the capacity to lay bare one's most intimate vulnerabilities. One such harrowing story comes from a survivor (which we will call Bridget to protect her anonymity), who faced a nightmare of cyberstalking, intimate image abuse (colloquially known as revenge porn), and relentless online harassment that lasted for years.

Rapid Data Heist: Akira Ransomware Group's Two-Hour Attack on Veeam Servers

In a startling development, the Akira ransomware gang has demonstrated a dramatic reduction in the time it takes to exfiltrate data from compromised servers. According to the BlackBerry Threat Research and Intelligence Team, this cybercriminal group managed to steal data from a Veeam server in just over two hours during a June attack on a Latin American airline.

No summer scares: 5 tips on how to keep your business cybersecure

Guiding employees' digital behaviors is key to avoiding potential cybersecurity breaches. However, remote work during summer weeks may disrupt normal routines and change the location of digital assets, leaving companies open to vulnerabilities. According to our latest Internet Security Report, malware detections on endpoints increased by more than 75% during the first months of the year.

Crypto Exchange Bybit Integrates Fireblocks Off Exchange

Fireblocks Off Exchange enables businesses across the world to trade on centralized exchanges without introducing counterparty risk. Today, we’re proud to share that Bybit is the newest exchange to integrate with Off Exchange. Bybit, a crypto exchange ranked the second-largest in the world, joins Deribit, with further integrations to follow. These include BIT, Bitget, Coinhako, Gate.io, One Trading, and OKX.

Why the World's Top MSSPs are Ditching Legacy SOAR for Hyperautomation

Managed Security Service Providers (MSSPs), desperate to automate repetitive tasks, initially turned to SOAR to reduce their workload and improve threat response times. Unfortunately, legacy SOAR tools still face scalability, flexibility, and integration challenges. As the complexity and volume of cyber threats continue to grow, the limitations of legacy SOAR have become more apparent, necessitating the move towards more advanced automation technologies like Torq Hyperautomation.

Savvy Security: Unpacking key SASE vendor selection criteria

Many companies are stepping up their security measures to protect against cyber risks associated with the increasing use of cloud services and remote work. As a result, the global deployment of Secure Access Service Edge (SASE) is on the rise. According to the 2024 Gartner CIO and Technology Executive Survey, 39% of respondents have already deployed SASE or plan to do so within the next 24 months.

CVE-2024-4879, CVE-2024-5178, CVE-2024-5217: ServiceNow MID Server Vulnerabilities Resulting in Unauthorized Code Execution

On July 10, 2024, ServiceNow disclosed a series of critical vulnerabilities impacting their platform, identified as CVE-2024-4879, CVE-2024-5178, and CVE-2024-5217. These vulnerabilities were responsibly disclosed to ServiceNow in May 2024 by Assetnote, a cybersecurity firm. ServiceNow responded by patching hosted instances in June 2024.