Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sinister SQL Queries and How to Catch Them

SQL Server is more than just a database—it's a powerful platform that can be leveraged by attackers for system access, persistence, and code execution. While organizations focus on protecting their valuable data, they often overlook the inherent capabilities within SQL Server that make it an attractive target for adversaries looking to establish footholds in Microsoft environments.

Enhancing Kubernetes Security: Strategies for Effective Secrets Management

Kubernetes powers modern application deployments, yet safeguarding its secrets remains a formidable challenge. In a 2024 report, IBM estimated that 16% of data breaches stemmed from compromised credentials, resulting in significant financial losses. The recent attack involving a stolen API key at the U.S. Treasury Department highlights the vulnerability of even well-protected systems.

Policy Implications from the Rise of State-Sponsored Crypto Crime

Supporting Japan FinTech Week has become a Fireblocks tradition. This March, we, as many in the ecosystem, chose to re-contextualize planned contributions and engagements as the week-long Tokyo event was the first significant global gathering of both regulators and industry after the Bybit hack.

The EU AI Act: Key deadlines, risk levels, and steps to prepare

The EU AI Act is one of the world’s first comprehensive regulations aimed at AI-based systems. While we had voluntary standards like ISO 42001, the Act introduced mandatory requirements that in-scope organizations must meet to avoid considerable fines and operational disruptions. ‍ If you develop, use, or distribute AI systems, you may have to meet the obligations prescribed by this directive. Our EU AI Act summary will help you do so by covering: ‍

How CISOs can justify their cybersecurity budget

Every year, companies reevaluate their budgets, making tough calls on where to invest for the most impact. In many organizations, cybersecurity spending is often seen as a cost center. However, without adequate security investments, companies put themselves at greater risk for data breaches that could disrupt business operations and damage customer trust, ultimately costing the company a lot more in the end.

Secure employee offboarding isn't happening fast enough to prevent employee data theft

Departing workers can pose significant risks to data. Let me share a story about an individual who stole and deleted valuable research data right before submitting his resignation: six weeks after a contingent worker left the company, the FBI contacted us. It turned out that the individual had tried to sell the company’s confidential data to a third party. When he left, everything seemed normal.

Managing shadow AI: best practices for enterprise security

The rush to work faster with artificial intelligence (AI) risks encouraging employees to accidentally put sensitive data at risk. Take this scenario: someone in the procurement team has a tight deadline, so they upload a confidential contract into an AI tool to review a few redlines. It’s unclear if the AI system is storing the data from the contract, how long it’ll be retained, and if the data will resurface in a future prompt to someone else.

Cloudflare DDoS Web Protection Demo

Cloudflare DDoS Web Protection provides automatic, intelligent DDoS mitigation from the edge of Cloudflare's global network — mitigating most attacks in three seconds. Advanced Adaptive DDoS Protection learns your unique traffic patterns and adapts to them to provide better protection against sophisticated DDoS attacks. Learn more.

API Security with Cloudflare API Shield Demo

Cloudflare API Shield provides many capabilities across API discovery & management, posture management, and runtime protection. This demo highlights some of these capabilities including machine learning discovery, sequence analysis and mitigation, schema learning, schema validation, volumetric abuse protection, organizational / user-created labels, risk labels, sensitive data detection, and posture management.

A10 Adds ThreatX API and Application Security to its Security Portfolio

A10 recently acquired ThreatX, a fully managed cloud-native application and API protection solution. Hear from A10's Jamison Utter and the co-founder and CPO of ThreatX, Bret Settle, about how this brings expanded capabilities to the A10's security portfolio and gives customers the flexibility to have protection wherever they want it, even in a hybrid environment.