Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Blogs

No summer scares: 5 tips on how to keep your business cybersecure

Guiding employees' digital behaviors is key to avoiding potential cybersecurity breaches. However, remote work during summer weeks may disrupt normal routines and change the location of digital assets, leaving companies open to vulnerabilities. According to our latest Internet Security Report, malware detections on endpoints increased by more than 75% during the first months of the year.

Crypto Exchange Bybit Integrates Fireblocks Off Exchange

Fireblocks Off Exchange enables businesses across the world to trade on centralized exchanges without introducing counterparty risk. Today, we’re proud to share that Bybit is the newest exchange to integrate with Off Exchange. Bybit, a crypto exchange ranked the second-largest in the world, joins Deribit, with further integrations to follow. These include BIT, Bitget, Coinhako, Gate.io, One Trading, and OKX.

HTX Integrates Fireblocks Off Exchange

HTX is the latest global exchange to integrate with Fireblocks Off Exchange, a first-of-its-kind solution that enables trading firms and asset managers to mitigate counterparty risk while trading on centralized exchanges. Through integrating with Off Exchange, HTX looks to strengthen their digital asset security, streamline global compliance operations, and create a better virtual asset trading experience for their users.

Key Learnings from the Disney Breach: 5 Ways to Stop Secret Sprawl

Do you have secrets sprawled across your tech stack? The recent Disney breach is as good a reminder as any to check, because it’s likely that you do. But first, let’s take a closer look at the Disney breach to understand what may have gone wrong, and how you can prevent a similar breach from happening to your business.

Nightfall AI vs. Google DLP

In today’s cloud-based work environments, it’s all too easy for assets with sensitive data like PII, PCI, PHI, secrets, and intellectual property (IP) to be sprawled across the enterprise tech stack. With the skyrocketing costs of data breaches, one sprawled secret can cost organizations an average of $4.45 million. This is where Data Leak Prevention (DLP) solutions come in to limit secret sprawl, prevent data leaks, and ensure continuous compliance with leading standards.

Looking for a Job in Cyber? Tips and Advice From the Pros

A career in cybersecurity can be rewarding, challenging, and, frankly, lucrative. But it's not the easiest industry to break into: the skills required for a cybersecurity role are both niche and specific, the bar for entry is relatively high, and there are very few entry-level jobs available. But don't be disheartened. The cybersecurity industry is crying out for fresh talent. With hard work, a little luck, and the right advice, you can set yourself up for a long and satisfying career in cybersecurity.

How to de-risk patching third party software packages

There are several steps your organization must take to protect itself from potentially exploitable packages. First, you’ll need to carefully review and triage the package vulnerabilities that present risk to your organization, then you’ll need to patch each one. Patching a package may sound easy, but doing so without breaking your product can be tricky. ‍ Before patching, you may review the changelog between versions. Opening the changelog, however, could further the patch dread.

IP Address Alert Investigations: Correlating and Mapping with MITRE ATT&CK

An Internet Protocol (IP) address is the digital equivalent of your home address. Your home has a unique identification number that gives information about your physical geographic location, like road, city, state, and country. An IP address provides similar information about the people and devices connected to a network.

10 Dimensions of Python Static Analysis

Python static analysis, also known as "linting", is a crucial aspect of software development. It involves inspecting your Python code without running it to identify potential bugs, programming errors, stylistic issues, or non-adhering patterns to predefined coding standards. It also helps identify vulnerabilities early in the development process, reducing the chances of deploying insecure code into production.

What To Know About the CDK Global Ransomware Attack

The CDK Global ransomware attack was first reported in June 2024. Ransomware infected CDK Global, a software vendor that serves thousands of North American car dealerships. This ransomware attack affected over 10,000 U.S. car dealerships, their employees and their customers.