Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

DORA Regulation: What Financial Institutions Need To Do

As a cybersecurity company, Obrela is vigilant in monitoring the evolving regulations and how these impact our clients, especially those in the financial sector. With the introduction of the Digital Operational Resilience Act (DORA), we see a transformative step forward in the European Union’s approach to financial cyber resilience. Here’s an overview of what DORA entails and what it means for financial entities.

Fireblocks x Injective: Revolutionizing DeFi with Enhanced Security and Speed

Injective is an open, interoperable layer-one blockchain optimized for building Web3 finance applications. Injective’s bespoke infrastructure can be utilized to launch scalable dApps such as derivatives exchanges, RWA protocols, lending platforms, prediction markets, and more. Fireblocks offers secure and efficient access to engage with the advanced DeFi features available through Injective.

The ethical considerations for AI-powered software testing

As AI integrates into every stage of the SDLC, the area of software testing is undergoing transformative and unprecedented changes. In this article, we will discuss the ethical considerations for AI-powered software testing, examining the advantages and potential hurdles generative AI presents as a new technology being applied across the SDLC.

2024 Security Trends Unveiled: Merging Cyber & Physical Realms

Dive deep into the future of security with our latest video, "2024 Security Trends Unveiled: Merging Cyber & Physical Realms." Kerstin Demko, our CSO, shares invaluable insights from the 2024 Trends Report, highlighting the evolving landscape where cyber and physical security converge.

As Many as 1 in 7 Emails Make it Past Your Email Filters

Fluctuations in consecutive quarterly reports demonstrates that organizations should be worried that their cyber defenses may not be strong enough to stop phishing attacks. I wrote an article back in April of last year about how 1 in 8 emails make it to a user’s Inbox. That number has remained relatively consistent — so much that even the Threat Insights Report for Q1 2024 from HP Wolf Security shows that stat is still accurate. But then there’s the Threat Insights Report for Q4 2023.

CISA Releases Cybersecurity Resources for High-Risk Communities

Working to ensure all communities within the United States are educated and prepared, the Cybersecurity and Infrastructure Security Agency (CISA) has released a set of tools, services and assistance to level the playing field. It’s no secret that any part of society that is less prepared for a cyber attack has less of a chance to defend itself — which potentially puts all of us at risk. So, CISA began placing some of their focus on high-risk communities within the United States.

Mastering Your 2024 Endpoint Security Strategy

In IT, endpoints are the physical devices that connect to a network system. In a corporate environment, endpoints include mobile devices, desktop computers, laptops, servers, and other equipment employees use to access the network and other critical digital systems. A company with fewer than 50 employees typically averages around 22 endpoints, 50-100 employees average more than 100, and companies with more than 1,000 employees average nearly 2,000.

Understanding Risk in Cybersecurity: Balancing Cost and Protection

Cybersecurity is a game of risk management, balancing the costs of protection against potential losses. This clip emphasises the importance of quantitative risk assessment to set appropriate budgets and limits. Learn why it's crucial to align security spending with the value of assets being protected, and how to avoid overextending resources.