Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Pixels/Trackers transfer data to foreign locations around the globe - including nation states of concern

By analyzing over 3,000 websites and over 100,000 associated webpages (using the client-side security scanning feature of Feroot Inspector) across 6 sectors, it was determined that pixels/Trackers transfer data to almost 100 countries around the globe. Table 1 shows the top 40 destinations of data being transferred by pixels/trackers collecting data from the analyzed websites – all of which were US-based.

Tines browser extension configuration guide

Professionals working in Cyber Threat Intelligence (CTI) enjoy playing detective, researcher, analyzer, and communicator. With Tines, now there’s a better way to quickly get answers for some of the most common questions that can tip off more strategic (read: exciting, fulfilling, meaningful) threat intelligence research.

The Rising Cost of Cyber Crime: $8 Trillion Impact on the World Economy in 2023!

In this video, we delve into the alarming estimates provided by Sub-Security Ventures, a trusted cyber crime magazine and an invaluable resource. Brace yourselves as we uncover the staggering projection that cyber crime will cost the world economy a staggering $8 trillion in 2023, up from $6 trillion just a few years ago. That's an average increase of a trillion dollars annually! But here's the shocking truth: while the cost of cyber crime skyrockets, our investment in protection organizations, whether public or private, between 2021 and 2025 is predicted to be a mere $1.75 trillion.

Fireblocks launches support for Avalanche Spruce Subnet

Fireblocks has launched support for Avalanche’s subnet, Spruce, an EVM-based testnet built for institutional blockchain deployments. Spruce is intended to be used by buy and sell-side institutions looking to experiment with blockchain infrastructure in a low-risk environment. Institutional participants have already begun onboarding onto the testnet, and will be using it to evaluate the advantages of executing and settling trades on-chain for different assets and applications.

National Cybersecurity Deep Dive: Invest in a Resilient Future and Forge International Partnerships

The first three pillars of the National Cyber Security Strategy focused on activities that could be accomplished in the near term–perhaps within a few years. The last two pillars start looking at some challenges that we need to address now.

ThreatQ v5: An Even Smarter Single Source of Truth

We’ve come a long way since ThreatQ v4 and our own Jay Allmond, UK Threat Intelligence Engineer at ThreatQuotient, recently shared the details during a hands-on webinar that’s now available on-demand. In this 30-minute session that as Jay says, “is light on PowerPoint and heavy on nerdy stuff”, we review the basics of the ThreatQ Platform and dive deep into some of the newest capabilities.

How Do You Perform a Supplier Risk Assessment?

When choosing a supplier to partner with, organizations need to perform their due diligence and assess the cyber risks associated with each particular supplier using risk assessment evaluations. Part of the supplier lifecycle management process includes ensuring that these third parties are meeting minimum security requirements, maintaining strong cybersecurity programs, and adhering to all relevant compliance regulations.

Random but Memorable - Episode 10.7: The Developer Special

Join us for the developer special! 👩‍💻🧑‍💻 Roo sits down with a panel of special guests to discuss how we're working and engaging with the dev community, the incredible suite of 1Password developer tools available, and a sneak peak at all the exciting things we have planned for the future.

Quality of Experience vs Quality of Service: Which are You Getting?

Quality of Service (QoS) is a standard metric for any infrastructure, networking, or operations team contracting with a tech vendor The average network SLA, for example, is crawling with QoS metrics covering a range of things, including packet loss, jitter, latency, bandwidth allocation, response time, and uptime.