Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Thwarting Cyberattacks: Top In-House Solutions

There is no doubt that the number (and severity) of cyberattacks is on the rise. While the lion's share of attention has been devoted to major breaches that often impact multinational organisations, the fact of the matter is that small- to medium-sized enterprises are also at risk. This is why managers and stakeholders must adopt the latest safety protocols to avoid incidents that might otherwise quickly bring operations to a halt. Let us look at four practical suggestions, and the unique benefits associated with each.

Fireblocks' new Browser Extension simplifies on-chain experience

Today, we are excited to announce our enhanced Browser Extension, providing seamless connectivity to dApps on over 30 EVM blockchains – with the security of Fireblocks MPC-CMP, Governance and Policy Engine, and DeFi threat detection capabilities. The new Browser Extension leverages components from Rabby Wallet open source, enabling customers to enjoy Fireblocks security with the intuitive Rabby interface and expansive dApp connectivity.

Why DCAP is Essential for Modern Data Security (A Closer Look)

Almost every company has a system for organizing file storage, which employees use regularly. Streamlining data storage in a corporate environment is not just about improving business processes; it is also about ensuring security. It is challenging to protect data if you do not know where it is stored, what it contains, its value, who owns it, who has access to it, and what its most significant threats are. This is where Data-Centric Audit and Protection (DCAP) systems come into play.

The Art of Deception: Turning the Tables on Attackers with Active Defenses

Once an attacker enters your network, one of their first actions will be to try and hide their tracks by blending in, using methods of deception such as mimicking normal user activities. A cyber defender can also use methods of deception to detect and slow the advance of these adversaries. This is known as an active defense. This article will discuss some methods of using Active Defences, sometimes referred to as ’deceptions,’ as one part of a comprehensive cyber defense strategy.

DORA's Reach: How UK ICT Service Providers Are Affected

The Digital Operational Resilience Act (DORA) is set to reshape the landscape of financial services in the European Union. But its impact extends beyond EU borders, particularly affecting UK-based Information and Communication Technology (ICT) service providers. Let’s explore how DORA might influence these providers and what steps they should consider taking.

Understanding DORA: The New European Regulation

With the rise in cyberattacks, robust measures are essential to reduce attack surfaces and respond swiftly to threats. Compliance with regulations like the Digital Operational Resilience Act (DORA) is crucial to prevent severe penalties and ensure business continuity. This blog post looks at DORA and introduces our white paper about this important new European regulation.

Email Security for Financial Institutions: Mitigating Risks and Ensuring Compliance

You no longer need to pull off a bank heist to pocket millions of dollars. Taking advantage of an email breach is easier for attackers and allows them to use your infrastructure’s weaknesses to demand ransom, steal personal information, or perform other fraudulent activities.

The Psychological Tactics Behind Email Scams

This blog looks at the intersection of psychology and email attacks to help guard your business against elaborate deception and adopt actionable strategies to defend your people and assets from manipulative schemes. After reading it, you’ll be better prepared to thwart scams and bolster your organization’s resilience against email-based threats.

Supercharge domain discovery with AI-powered External Attack Surface Management (EASM)

Modern organizations have sprawling attacks surfaces of known and unknown assets that grow each day. This means understanding and managing your external attack surface is more crucial than ever. But with the vast number of digital assets that organizations need to monitor, accurately identifying every component of your attack surface can seem overwhelming – which is why many turn to External Attack Surface Management (EASM).