Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Improving IoT security with log management

The Internet of Things (IoT) revolution has set the beginning of a new age of data transfer. Each day, a massive number of new devices get added to all kinds of network infrastructures, transferring gargantuan amounts of data back and forth. In the next decade, we expect the number of IoTs to grow to a staggering 207 billion connected devices – practically outnumbering the human population tenfold.

Flipkart launches 3.6 million wallets for Web3 brand engagement program using Fireblocks

India-based e-commerce giant Flipkart is utilizing Fireblocks’ Wallets-as-a-Service to seamlessly create wallets on their FireDrops app, providing a user-friendly and highly integrated Web3 experience for their customers. To date, over 3.6 million active wallets have been created on the platform.

Doing Things the Right Way

Backup immutability. It’s a phrase you may hear a lot. But what is immutability? According to the dictionary definition, it is this; For you, It may simply be a tick box you need to satisfy for cyber insurance policy or a line item on a Request For Proposal document. Regardless of the what or the why it is important to understand how immutability support is an important layer of your organizations’ overall data protection strategy.

Introducing Security Ratings for Telecommunications, Internet Service Providers, and Cloud Providers

Telecommunications, Internet Service Providers, and Cloud Providers are some of the most critical sectors on the planet. They enable global connectivity, provide access to a wealth of information in real time, and transform business operations. As the foundation of modern communication, these industries have ushered in countless innovations and propelled society forward.

Red Flags for Phishing: Verizon Outlines Common Scams to Watch Out For

Verizon has published an article outlining various forms of social engineering attacks, including SMS/text messaging phishing (smishing), voice phishing (vishing), and spear phishing (targeted attacks, often via email). Verizon warns users to be on the lookout for the following red flags: Verizon concludes, “Remember, phishing is common and perpetrators are hoping to catch you with your guard down. But most companies will never proactively reach out to you.

Cybercriminals Celebrate the Holidays with Dark Web Data Dumps, Dubbed "Leaksmas"

Millions of data records and GBs of data from organizations around the globe were made freely available to cybercriminals to coincide with dates around Christmas of 2023. The pressure presented by cybercriminals threatening to publish data on the web is very compelling. After all, what company wants to be responsible for millions of everyday people potentially becoming victims of scams and cyber attacks? That’s right, not a single one.

Another Mortgage Lender Embattled; LoanDepot Faces Disruptions

LoanDepot is one of the nation’s most widespread nonbank mortgage lenders, offering financial solutions and opportunities to homeowners. Based in Irvine, California, LoanDepot allows homeowners to purchase land, refinance it, and strike the best deal in equity costs. After coming into existence in 2010, their history became one of upward growth; two years later, they were licensed in all 50 states and began expansions.

Keeper Security Introduces Granular Sharing Enforcements

Keeper Security is excited to introduce Granular Sharing Enforcements for all products in the Keeper® platform. This feature, an extension of Keeper’s robust existing sharing policies, enables administrators to apply detailed restrictions for record creation and sharing to user roles. By doing so, Keeper Admins can easily enforce the principle of least privilege and simplify compliance.

Introducing Cloudflare's 2024 API security and management report

You may know Cloudflare as the company powering nearly 20% of the web. But powering and protecting websites and static content is only a fraction of what we do. In fact, well over half of the dynamic traffic on our network consists not of web pages, but of Application Programming Interface (API) traffic — the plumbing that makes technology work.