Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Case Study

LUKB taps Fireblocks to build infrastructure for new crypto trading and custody product

Luzerner Kantonalbank (LUKB), the leading bank in the Swiss canton of Lucerne, uses Fireblocks to provide the infrastructure for this new digital asset initiative. Read the blog and watch the video. In an era where digital assets are reshaping the landscape of financial services, Luzerner Kantonalbank (LUKB), the leading bank in the Swiss canton of Lucerne, is at the forefront of innovation.

How do you Monitor and Manage a Network Without Borders?

There are only two options for managing a global multi-cloud network: either by using a combination of inference, hope, and intuition or with mathematical certainty. When conducting 5 million financial transactions daily, it’s essential to operate with certainty, regardless of your network’s size or geographical distribution. Auditors don’t accept inferences; they demand certainty when determining compliance, and a poor audit can be disastrous for the business.

Moody's Analytics Uses Protegrity Pseudonymization to Protect CID Data

The data protection landscape is changing. The rapid adoption of cloud and software as a service (SaaS) greatly affects the financial industry, where many institutions rely on SaaS vendors for data protection previously implemented in-house. Moody’s Analytics relies on cloud service providers (CSPs) to adequately protect its data, showcasing the need for scalability, industry cost controls, and flexibility.

MDR firm saves $100K per year with LimaCharlie

Recon Infosec is a growing managed security services provider run by a team of seasoned cybersecurity experts. After switching from their custom-engineered security stack to the LimaCharlie SecOps Cloud Platform, they achieved an annual cost savings of $100,000, improved their mean detection and response times by 98%, and laid the groundwork for scalable, long-term growth.

The Growth in Job Posting Spear Phishing Techniques: A Case Study

In recent years, fake job hiring scams have become a common form of social engineering. Threat actors use these scams to steal money, launder money, commit identity theft, or carry out other fraudulent or illegal activities. The motives of threat actors behind fake job hiring scams vary. Some are simply looking to make a quick buck, while others are more interested in stealing personal information or committing identity theft.