Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

What is a trust management platform?

When you start pursuing compliance for a particular security standard, you do it with a specific goal in mind. Maybe you’re pursuing compliance because it’s a legal requirement in your industry or because a prospective customer requires it. ‍ But what happens after you achieve that initial SOC 2 or ISO 27001? It’s easy to get caught up in checking the boxes and lose sight of the why behind your security and compliance work. ‍

What is a Cyberattack?

A cyberattack is an attack on computers, networks or systems by cybercriminals in an attempt to steal or access sensitive information. The information stolen during an attack can also open the door to other types of cyberattacks such as social engineering scams. Continue reading to learn more about cyberattacks and what you can do to protect yourself against them, both in your personal life and at your workplace.

Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy

Researchers at the Lookout Threat Lab have discovered a new Android surveillance tool which we attribute with moderate confidence to the Law Enforcement Command of the Islamic Republic of Iran (FARAJA). Named BouldSpy for the “BoulderApplication” class which configures the tool’s command and control (C2), we have been tracking the spyware since March 2020.

What's the difference: Vulnerability scanning vs Penetration testing

Vulnerability scanning and penetration testing should be an essential part of your cybersecurity strategy. This blog discusses the above methods in the context of securing your web applications, including the benefits, drawbacks, and compliance implications. Table of contents: What is a vulnerability scan? What is a penetration test? What are the drawbacks of the traditional pen test model? Should I only to pen tests, vulnerability scans, or both?

Is it possible to manage a Web3 business without touching crypto?

Operating a Web3 business typically requires the use of crypto in either development, operations, or finance. However, some new entrants into the Web3 space may not want to deal with the accounting, regulatory, or custody issues associated with crypto – or with its volatility. So, how can Web3 businesses efficiently operate while minimizing their exposure to crypto?

Create a seamless Web3 onboarding experience for Web2 users

Web2 users are accustomed to an easy sign-up and onboarding process for almost any application or service they engage with. In most cases, they simply use their email or phone number to create a username and password. However, when engaging with Web3 applications, users will need to either connect an existing wallet to the application or create a new wallet.

What can Web3 offer retail, luxury goods, and sports brands?

Web3 is top-of-mind for many marketing and customer experience team in 2023. Multiple high profile companies such as Nike,Tiffany, Spotify, Gucci, have already launched Web3 initiatives. Web3 has unique characteristics that offer brands and sports organizations a new way to engage with customers, users, and fans through loyalty programs. At the same time, it helps organizations cater to different demographics and directly monetize these efforts.