Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Choosing Automated Risk Remediation Software (in 2023)

When it comes to improving your cybersecurity posture, few strategies have as much of an impact as your cyber risk remediation program. Efficient risk remediation ensures security risks and vulnerabilities are shut down faster, reducing the potential risks of data breaches and their financial impacts. The cornerstone of an efficient remediation program is cyber risk remediation software that automates manual processes to improve the efficacy of risk mitigation efforts.

Application Security Requirements: Trends and Best Practices

Ensuring application security is not just about protecting data. It’s about safeguarding your company's reputation, keeping customer trust, and adhering to increasingly stringent regulatory requirements. Read on as we delve into application security requirements: the pressing security threats impacting applications, the critical security requirements your application needs to meet, and the best practices to adopt to achieve robust application security.

Integrated Intelligence Enrichment With Threat Intelligence Management

SOC analysts are overwhelmed with alerts and manual repetitive tasks that negatively impact their ability to conduct and prioritize investigations of critical events. They don’t have the time, or bandwidth, to sift through data feeds or sources to identify and synthesize intelligence related to an incident.

The Rekt Test: 12 Questions to Assess Your Blockchain Security

At Fireblocks, we firmly believe that industry collaboration and intelligence-sharing drives adoption of the best security practices and advances the ecosystem as a whole. This week, Fireblocks, along with fellow Web3 cybersecurity leaders, released the Rekt Test, a simple yet powerful guide for any business to test and assess the security of their blockchain application.

Multiple Junos OS Vulnerabilities Could lead to Unauthenticated Remote Code Execution

On August 17th, 2023, Juniper Networks released out-of-band fixes for multiple vulnerabilities that could be chained together to achieve unauthenticated remote code execution (RCE) on SRX and EX series devices. The vulnerabilities impact the J-Web component of Junos OS, the operating system running on the devices.

Tennessee Employees Lose Their Data to Consolidated Retirement System Breach

The Tennessee Consolidated Retirement System is a retirement and benefits program administered to many full-time employees throughout the state. If you are an employee within the state of Tennessee, there's a good chance that your data is tied up in this system and that you're relying on the program administrators to protect your personal and financial information.

Weekly Cybersecurity Recap August 18

Financial institutions and state government agencies were the main targets of hackers this week. Major organizations like Bank of America and Hospitality Staffing Solutions were hit hard resulting in huge data losses for citizens, and the states of Pennsylvania, Vermont, and Tennessee each experienced major data losses in their regulatory bodies or programs. Learn more about each of these serious data breaches and find out if your information is safe.

Prioritizing cyber resilience in response to a potential ransom payment ban

Ransomware attacks do not simply start and end with a locked computer screen and a ransom note. They unravel as intricate narratives, leaving a trail of financial wreckage, operational interruptions, and reputational damage in their wake. These attacks bear significant costs. In 2022, the average cost of a ransomware attack was a whopping $4.54 million, per IBM Security and the Ponemon Institute. And that does not include the actual ransom payment itself.

Impact of the New SEC Cyber Incident Reporting Rules on the C-Suite and Beyond

We recently hosted a compact and very engaging panel discussion about the new SEC Cyber Incident Reporting Rules due to come into effect later this year. We were fortunate to be joined by two well-known experts: In the post, we will *not* rehash what was said in the panel discussion. If you did not get to attend the live session, we invite you watch it on-demand – it’s 30 minutes well spent!