Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Fireblocks Launches Self-Service Suite for Startups to Empower Builders Amid Crypto Sentiment Shift

Fireblocks launches Fireblocks for Startups, a suite of self-service tools designed specifically for startups to easily build blockchain-based products. Since launching the Fireblocks for Startups pilot, the company has seen an increase of 50% of startups using its platform, such as TaxNodes, Dendra, and Kunga.

Vendor Risk Management Principles: A Strategic Guide For Security Managers

In today’s interconnected business environment, organizations rely heavily on third parties, and while third party relations are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors. This makes vendor risk management (VRM) a critical component of any company's overall risk management strategies. Effective VRM practices help protect sensitive data and maintain robust security postures, minimizing the potential risks introduced by vendors.

Cross-site scripting vulnerability found in Oracle Integration Cloud

In November 2023, while conducting a security assessment on a client’s instance of the Oracle Integration Cloud Platform, I discovered a medium severity vulnerability nestled within the handling of the “consumer_url” URL parameter. This flaw unveiled a Cross-Site Scripting (XSS) vector that could be exploited by a user with malicious intent.

Log it like you mean it: Best practices for security

Not every log is equal As solutions architects at Elastic, we receive a lot of questions around how to fine-tune a security environment, such as: The answer is often, "it depends." So, we’d like to explore the parameters behind these questions to provide you with a more comprehensive understanding of how they influence the response.

Once and future code snippets: How AI reignites risk

Code snippets copied from copyleft-licensed open source projects represented the biggest risk in software 15 years ago. The Heartbleed vulnerability, discovered in April 2014, brought to the fore concerns about the security of open source components, and license risk took a bit of a back seat. But the problem never went away. Now, the advent of Generative AI as a tool for writing software is shining a new light on the issue.

Cybersecurity Tips for Traveling Employees: A Summer Guide

As the warm summer months roll in, many of your employees are likely planning vacations and business trips. While these travels can offer much-needed breaks and valuable business opportunities, they also present unique cybersecurity challenges. As a Managed Security Service Provider (MSSP), we understand the importance of protecting your company’s data, no matter where your employees are. Here are some essential cybersecurity tips to keep in mind for your traveling workforce this summer.

Data Catalogs: What They Are & Why They're Important

A data catalog is a critical data repository that enables visibility into what data you have, where it’s going, and who owns it – all critical inputs for maintaining data security. A company's data needs to be both organized and centralized, while also easily being discoverable. In this article, we’ll explore what data catalogs are and how they can create business value in your organization.