Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Using Endpoint Detection and Response (EDR) in Mobile Defense

Endpoint detection and response (EDR) has been a standard method for securing on-premises devices for years. When combined with antivirus software, it’s proven an effective way to uncover threats before they can cause severe damage. However, the growth of smartphones and other mobile devices means more and more work is getting done outside of the office. Organizations can no longer rely on traditional EDR protections as millions more endpoints are now exposed to the threat of a cyber attack.

Fireblocks x Google Cloud's Confidential Space to Enhance Digital Asset Security

We are excited to announce our new integration with Google Cloud’s Confidential Space, which dramatically enhances the security of customer digital assets. This integration solves a critical challenge in cryptocurrency security: private key management. By leveraging Confidential Space, Fireblocks customers can ensure that no single party has full access to private keys, significantly reducing the risk of theft or misuse.

Understanding the Implications of the New Australian Cyber Security Act for Your Organisation

The newly passed Australian Cyber Security Act is part of the reform laid out in the 2023–2030 Australian Cyber Security Strategy. The legislation aims to fill gaps in Australia’s overall cyber resilience and support the government’s ambition to become the most secure country globally.

How Zenity Unifies Security, Platform, and Citizen Developer Teams to Enable AI Agents

AI Agents are revolutionizing enterprise efficiency, automating decisions, and enhancing capabilities. But while these agents drive operational improvements, they also introduce unique security challenges. Traditional silos often hinder effective risk management.

NIS2 Compliance Advice from Luxembourg's Regulatory Authority

NIS2 is a transformative directive reshaping how organizations across Europe and the globe approach cybersecurity, supply chain management, and operational resilience. A lot has been written about compliance strategies, but what does NIS2 mean in practice? We’ve asked the Institut Luxembourgeois de Régulation (ILR), Luxembourg’s national regulatory authority responsible for overseeing the implementation and enforcement of NIS2 in the country.

Mike Machado Lightning Interview

Welcome to the second installment of Riscosity’s Lightning Interview Series In this episode, we sit down with Michael Machado, a security industry veteran and former CISO at public and pre-IPO companies including RingCentral, Shippo, and BeyondTrust. Ever wonder the best strategy for gaining meaningful budget increases as a CISO? Tune in to find out.

Navigating the new era of attacks

In this episode of Server Room, we sit down with Karuppaiah Veeraiah, Head of Security at Zoho, to explore the latest trends and groundbreaking technologies in the world of cybersecurity. We delve into practical insights on how organizations can stay ahead of emerging threats, fortify their digital defences, and prepare for the challenges of the upcoming year.

Demystifying Kubernetes for Security Analytics: Enhancing TDIR for Cloud Deployments

Kubernetes has revolutionized cloud applications, enabling them to function as microservices distributed across global clusters, significantly enhancing fault tolerance, high availability, and cost efficiency. However, with this great power comes the critical responsibility of maintaining security and observability. Despite its many strengths, Kubernetes lacks a built-in centralized log store, relying instead on third-party plugins for this essential functionality.