Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Fireblocks x Cosmos: Institutional Access to the "Internet of Blockchains"

Fireblocks has consistently led the way in providing the fastest and most diverse range of blockchain support. With a growing list of over 60 supported blockchains, Fireblocks enables our customers to securely custody tokens on the latest chains and quickly build innovative services for their customers. Today, we are excited to announce that Fireblocks has expanded our support for the Cosmos ecosystem – delivering custody, DeFi, and staking support across several leading appchains.

Navigating the Cyber Landscape Today: 5 Tips for CISOs by CISOs

The stakes are higher than ever for CISOs. Just one breach can be catastrophic for an organization, and new rules and regulations add even more pressure. We surveyed 200 CISOs on the current landscape, and asked a handful of them for advice on how to overcome today’s challenges. Here are some of the key recommendations for CISOs who are navigating today’s cyber landscape.

From Office to Remote: Adapting Endpoint Security Strategies

As remote work becomes the norm, organisations face new challenges in securing devices outside the office. This clip discusses the return to host-based security and the importance of robust endpoint security measures backed by logs and alerts. Learn how to adapt your security strategies for remote environments where device locations are unknown.

Banking Fraud 2024: Key Risks and Strategies for Prevention

As we navigate through 2024, banking fraud continues to evolve, presenting new challenges for financial institutions. Driven by advancements in technology and changing economic conditions, these threats require banks to stay vigilant and adopt robust strategies to protect themselves and their customers.

Q1 2024 Cyber Threat Landscape Report: Insider Threat & Phishing Evolve Under AI Auspices

In Q1 2024, we saw an evolution in techniques used by attackers, some of which may point to longer term trends in the variation and sophistication of attacks faced by organizations. In particular, with regards to phishing, we saw SMS and voice-based tactics being used, which raises concern around the potential for deep fakes and AI-type technologies to further enhance the effectiveness of phishing attacks.

Announcing Vanta's industry-first partnership to automate HITRUST e1

Today we’re excited to announce that Vanta has partnered with HITRUST Services Corp., the leader in cybersecurity assurances, to be the first automated compliance solution for the HITRUST e1 Assessment and reseller of the HITRUST MyCSF platform. Vanta is the first pre-built solution that includes the controls, documents, and policies necessary to demonstrate your commitment to safeguarding data and protected health information (PHI) — all in a way that can be validated by HITRUST. ‍

OSV Scanner vs npm-audit: A detailed comparison of SCA tools

The widespread adoption of external libraries and packages in the modern application development process introduces potential security risks that could impact the entire application. To address this, Software Composition Analysis (SCA) tools like npm-audit and OSV Scanner play an important role.

Leadership Strategies for Risk Reduction, Transparency, and Speed

To respond to the increasing number of federal cybersecurity recommendations and regulations, cybersecurity leaders and their teams need to be confident in the transparency and resiliency of their security processes. The key is a strong and well documented risk management program. This is imperative for the compliance or incident audits that come with regulations.

Unlock Convenience with Brivo: Remote Lock Control

Discover the future of access control with Brivo! In this video, we dive into the seamless integration of Brivo's technology that allows for remote unlocking of doors, eliminating the need for on-site personnel. This not only enhances convenience but also significantly boosts efficiency in managing access to your spaces.