Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What is multi-step reasoning?

Multi-step reasoning is a concept that is taught in grade school math class, but it applies far beyond mathematical calculations and word problems. It is the process of solving a problem requiring multiple individual calculations or steps in order to reach the final answer. Multi-step reasoning requires sequencing, logic, and sometimes prior knowledge or inference.

This is How the Disney Insider Threat Incident Reframes IAM Security

It’s not that often that a story about a Joiner-Mover-Leaver (JML) failure makes the international news. But throw in an insider threat actor making potentially life threatening changes to the impacted systems and it becomes quite the doozy. Especially when the company at the center of the story is Disney.

Fireblocks x Uniswap Labs: Bringing Unichain to the Fireblocks Network

Today, we’re excited to announce that Fireblocks has expanded our blockchain support with the addition of Unichain – a Superchain L2 built by Uniswap Labs that’s designed to be the home for DeFi and liquidity across chains. At Fireblocks, we are committed to continually delivering the fastest blockchain support and building secure solutions to access and trade across DeFi platforms.

How Database Access Controls Evolved to Meet Modern Security Needs

Teleport's Database Access Controls (DAC) have always been designed to offer secure, auditable access to databases. But in today's rapidly evolving security landscape, simply having access controls isn't enough. Organizations need more granular control, better visibility, and seamless integration with existing security policies. This post explores how Teleport's latest features—object-level permissions and Teleport Policy integration—address these needs.

API, Identities and solving for the biggest challenges

API calls are the backbone of modern software, enabling applications to communicate and share data seamlessly. However, with this integration comes the challenge of understanding and managing the identities used in API calls. These identities, often tied to authentication and authorization mechanisms, are crucial for determining what data is accessed and exchanged.

More Than Compliance: Elevate Your Security Posture with 1Password

You run a business that handles sensitive customer data. To ensure you’re following industry standards, you diligently work to achieve compliance with relevant laws and regulations, such as HIPAA, SOC 2, or GDPR. You invest in the necessary tools, train your staff, and implement the required security policies. After an exhaustive process, you proudly receive your compliance certification.

What's New With Torq: November 2024

As we close out 2024, Torq is rolling out powerful new updates to help security teams start the new year with even greater efficiency and impact. These recent enhancements are designed to streamline operations, boost productivity, and support seamless collaboration. Here’s a look at the latest features set to transform your security operations.

Autumn 2024 Product Releases: What's New at Astra Security

As organizations grow and adopt cloud-native technologies, securing digital infrastructure at scale has become increasingly complex. According to the Cloud Security Alliance, 73% of organizations struggle to secure business-critical cloud applications due to misconfigurations and limited risk visibility. Ransomware alone can cost companies millions, and with the rise in cyber threats, even cyber insurance may not fully protect them from repeated attacks.

ElizaRAT and Beyond: The Evolution of APT36's Malware Arsenal

APT36, also known as Transparent Tribe, is a well-known cyber espionage group attributed to Pakistan. Active since 2013, this advanced persistent threat (APT) group has focused its efforts primarily on Indian government sectors, including defense, education, and key infrastructure. APT36 has demonstrated consistent sophistication in their tactics, evolving their methods to target a wide array of platforms and systems.