Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Announcing the Fireblocks MPC-BAM Protocol

The Fireblocks Cryptography Research Team has developed MPC-BAM, a new two-party ECDSA MPC protocol that achieves an ideal balance among the three key efficiency metrics in cryptographic protocols: rounds, communication, and computation. Multi-party computation (MPC) cryptography protocols are critical for the decentralized finance (DeFi) ecosystem as they enhance security and privacy while allowing direct custody operations.

Announcing Fireblocks Swaps and Fireblocks Token Allowance Manager

At Fireblocks, our Decentralized Finance mission is to reduce the complexity to access DeFi protocols and protect users when interacting onchain. Interest in Decentralized Finance, or DeFi, is growing rapidly. In fact, the Fireblocks DeFi suite has supported over $22B in DeFi volume in the past 90 days alone and witnessed a 110% surge in DeFi volume between the second and third quarter of this year.

Introducing Fireblocks Key Link: A Seamless Integration for Existing Key Management Solutions

For digital asset businesses, the increased clarity in the global regulatory landscape, driven by frameworks like MiCA and DORA in the EU and from the Hong Kong SFC and Monetary Authority, has been a welcome evolution. It also means that internal and external compliance requirements are growing more complex to manage as digital asset businesses consider expansion strategies and the need to streamline operational plans.

The Quantum Horizon: Shaping the Future of IoT/OT Cybersecurity

The rapid evolution of the Internet of Things (IoT) and Operational Technology (OT) is transforming industries, especially in critical sectors like healthcare. While these innovations promise enhanced efficiency and connectivity, they also expose organisations to a broader and more complex cybersecurity threat landscape. With quantum computing on the horizon, the stakes have never been higher.

Past, Present, and Future of IoT/OT Security in Automotive Cybersecurity

At the Device Authority Virtual Summit, Kaivan Karimi discussed how, as IoT and OT ecosystems grow more intertwined, especially within the automotive industry, the stakes in cybersecurity have never been higher. Connected vehicles, once a novel innovation, are now mission-critical infrastructure vulnerable to advanced threats.

The best ways to answer security questionnaires | TrustTalks Ep 5 | Security and GRC Podcast

Seeking a solution that streamlines vendor risk management and automates security questionnaires? Imagine a tool that offers a comprehensive portal, securely shares information, uses AI to handle responses, and frees up your evenings. It might sound too good to be true, but with ⁠TrustShare⁠, it’s a reality. Forget the hassle of maintaining a knowledge base or configuring tools meant for RFPs. TrustShare takes care of everything, from AI-driven responses to seamless information sharing, which leads to faster sales cycles.

Things to do before you switch audit firms | TrustTalks - Ep 4 | Security and GRC Podcast

Switching audit firms is not just a routine decision; it’s a strategic move that can significantly impact your business’s financial health and compliance. Whether you’re dissatisfied with your current auditor’s performance, seeking specialized expertise, or looking to cut costs, making the switch can offer numerous benefits and challenges. In this podcast, we’ll explore what happens when you switch audit firms, including the steps involved, potential risks, and key considerations to ensure a smooth transition.

Privacy vs confidentiality: What is the difference? | TrustTalks - Ep 3 | Security and GRC Podcast

Are you confused about the difference between privacy and confidentiality? Don’t worry, you’re not alone. While these terms are often used interchangeably, they actually have distinct meanings. In this podcast, we will explore the nuances of privacy and confidentiality, helping you understand their significance and how they relate to each other. Privacy refers to the right to maintain control over your personal information. It involves the ability to keep certain details about your life, preferences, and activities private and secure.

Quick guide to ISO 42001 and NIST AI RMF | TrustTalks - Ep 2

As businesses increasingly turn to artificial intelligence (AI) to enhance innovation and operational efficiency, the need for ethical and safe implementation becomes more crucial than ever. While AI offers immense potential, it also introduces risks related to privacy, bias, and security, prompting organizations to seek robust frameworks to manage these concerns. In response to this surge in AI adoption, national and international bodies have been developing guidelines to help companies navigate these challenges. These frameworks not only aim to mitigate potential risks but also ensure compliance with evolving regulations.