Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Best practices for creating least-privilege AWS IAM policies

AWS Identity and Access Management (IAM) enables organizations to set up permissions policies for users and workloads that need access to cloud services and resources. But as your cloud environment scales, it can be challenging to create and audit IAM policies that work effectively without compromising security.

Half of all Ransomware Attacks This Year Targeted Small Businesses

New data shows just how crippling ransomware has been on small businesses that have fallen victim to an attack and needed to pay the ransom. Logic would normally dictate that ransomware gangs are going to go after the “big fishes” – the larger organizations with deep pockets. But with the advent of the “as a service” model of ransomware, threat actors have found a niche, with many of them focusing on businesses with 1 to 50 employees.

From Theory to Practice: Webinar on Access Management Essentials

Implementing privileged access management (PAM) is crucial in safeguarding your organization’s critical systems and sensitive data against unauthorized access and compromise. Join us for an in-depth look at effective PAM strategies with our cybersecurity experts Jonathan Care and Aleksandr Dymov. This webinar will guide you through essential PAM practices for securing critical assets and minimizing security risks across your organization.

Mastering KubeVirt VM Backup and Restore with CloudCasa

KubeVirt has revolutionized the handling of virtual machines (VMs) within Kubernetes environments, providing a seamless bridge between traditional and cloud-native infrastructure management. CloudCasa enhances this integration by offering comprehensive backup, restore, and migration services for VMs running on KubeVirt and KubeVirt-based systems such as SUSE Virtualization(Harvester) and Red Hat OpenShift Virtualization.

Phishing Attacks Exploit Microsoft Visio Files and SharePoint

Threat actors are exploiting Microsoft Visio files and SharePoint to launch two-step phishing attacks, according to researchers at Perception Point. “Perception Point’s security researchers have observed a dramatic increase in two-step phishing attacks leveraging.vsdx files – a file extension rarely used in phishing campaigns until now,” the researchers explain.

Balancing Security: When to Leverage Open-Source Tools vs. Commercial Tools

When deciding what approach to use for security tooling, it seems like there are two choices. Like everything in security, there is more to unpack in reality. In this article I want to explore when open-source security tools should be used, when commercial tools are more effective, and if we can trust tools built from an open-source core.

Unlocking MSP Success: The Power of AI and Trusted Partnerships

The cybersecurity landscape has evolved dramatically, placing IT managers under pressure to adapt. A 168% rise in evasive malware detected by WatchGuard in Q2 2024 underscores this shift, with threat actors following behavioral patterns and adopting attack techniques that become popular and dominate in waves.

Scaling the Distribution and Trading of Tokenized Assets on the Fireblocks Network

At our most recent Fireblocks Network Open House in London, we hosted a panel featuring Fireblocks CEO Michael Shaulov, Ownera CEO Ami Ben-David, and Archax Chief Revenue Officer, Nick Donovan. In the panel, we discussed our new partnership with Ownera, a provider of interoperability technology and transaction orchestration using routers; together, we’re enabling financial institutions to distribute, access and trade tokenized securities on the Fireblocks Network.