Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Announcing the Fireblocks MPC-BAM Protocol

The Fireblocks Cryptography Research Team has developed MPC-BAM, a new two-party ECDSA MPC protocol that achieves an ideal balance among the three key efficiency metrics in cryptographic protocols: rounds, communication, and computation. Multi-party computation (MPC) cryptography protocols are critical for the decentralized finance (DeFi) ecosystem as they enhance security and privacy while allowing direct custody operations.

Announcing Fireblocks Swaps and Fireblocks Token Allowance Manager

At Fireblocks, our Decentralized Finance mission is to reduce the complexity to access DeFi protocols and protect users when interacting onchain. Interest in Decentralized Finance, or DeFi, is growing rapidly. In fact, the Fireblocks DeFi suite has supported over $22B in DeFi volume in the past 90 days alone and witnessed a 110% surge in DeFi volume between the second and third quarter of this year.

Introducing Fireblocks Key Link: A Seamless Integration for Existing Key Management Solutions

For digital asset businesses, the increased clarity in the global regulatory landscape, driven by frameworks like MiCA and DORA in the EU and from the Hong Kong SFC and Monetary Authority, has been a welcome evolution. It also means that internal and external compliance requirements are growing more complex to manage as digital asset businesses consider expansion strategies and the need to streamline operational plans.

The Quantum Horizon: Shaping the Future of IoT/OT Cybersecurity

The rapid evolution of the Internet of Things (IoT) and Operational Technology (OT) is transforming industries, especially in critical sectors like healthcare. While these innovations promise enhanced efficiency and connectivity, they also expose organisations to a broader and more complex cybersecurity threat landscape. With quantum computing on the horizon, the stakes have never been higher.

Past, Present, and Future of IoT/OT Security in Automotive Cybersecurity

At the Device Authority Virtual Summit, Kaivan Karimi discussed how, as IoT and OT ecosystems grow more intertwined, especially within the automotive industry, the stakes in cybersecurity have never been higher. Connected vehicles, once a novel innovation, are now mission-critical infrastructure vulnerable to advanced threats.

Protecting Against Bot-Enabled API Abuse

APIs have become the backbone of modern digital ecosystems, powering everything from mobile apps to e-commerce platforms. However, as APIs grow in importance, they also become prime targets for malicious actors. Increasingly, bots are being weaponized to exploit vulnerabilities, overwhelm systems, and siphon sensitive data—all without triggering alarms until it’s too late.

Admin update: Create auto-lock, release channel, and 1Password browser extension rules

Every organization has its own team culture, processes, and security requirements. That’s why we’re continuously updating 1Password Enterprise Password Manager with new options that give you greater flexibility and granular control.

CrowdStrike Announces Falcon Identity Protection for AWS IAM Identity Center

As organizations scale their operations on Amazon Web Services (AWS), they must secure their identities and ensure all users have the correct permissions. AWS IAM Identity Center is built to simplify access management across multiple AWS accounts — a critical tool for rapidly growing AWS environments. This hub for identity data and processes demands strong protection against the identity-focused threats growing popular among today’s adversaries.

The Rise of Cross-Domain Attacks Demands a Unified Defense

Modern adversaries are quiet. No longer reliant on clunky malware to breach their targets, they have adopted more subtle and effective methods to infiltrate businesses, move laterally and access critical applications, steal data, impersonate users and more. They are also gaining speed: The average eCrime breakout time, now just 62 minutes, has fallen in recent years as adversaries accelerate from initial intrusion to lateral movement.

CrowdStrike Showcases Cloud Security Innovation and Leadership at AWS re:Invent

As organizations accelerate their innovation in the cloud and their adoption of AI, securing AI workloads and identities has become critical. Misconfigurations, vulnerabilities and identity-based threats expose high-value assets to potential manipulation and exploitation. For AWS customers, advancing cloud security means establishing resilient guardrails that protect innovation without compromising speed.