Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Fireblocks CEO Says Stablecoins, Tokenization Have "Enormous Untapped Potential" At SPARK Conference

The anticipated change in stance from US regulators will drive a huge boost to global stablecoin adoption, which is already rapidly gaining traction as their share in cross-border and business-to-business payments grows, according to Michael Shaulov, CEO of Fireblocks.

New RBAC feature offers granularity and flexibility for Outpost24's EASM customers

A new role-based access control (RBAC) feature has been added to Outpost24’s external attack surface management (EASM) solution. This opens up new possibilities for Outpost24 customers, allowing them to be more granular when it comes to configuring permissions for different roles.

How Governments Can Mitigate AI-Powered Cyber Threats

Cybersecurity leaders across all levels of government are growing increasingly alarmed by the rise of cyber attacks fueled by Artificial Intelligence (AI). Cybercriminals are now incorporating machine learning and automation into their strategies, significantly boosting the scale, efficiency and sophistication of their attacks. According to a recent survey of over 800 IT leaders, a staggering 95% believe that cyber threats have become more advanced than ever before.

How To Protect Your IP Address

You can protect your IP address by hiding it and masking your location to prevent cybercriminals from impersonating or tracking you. An IP address, also called an Internet Protocol address, is a series of unique numbers that identifies your device on the internet or the network it’s connected to. Your IP address allows information to be sent across a network and distinguishes your device from others on the internet.

Top 5 PII Data Masking Techniques: Pros, Cons, and Best Use Cases

Protecting sensitive information has never been more critical, especially in today’s AI-driven world. As businesses increasingly leverage AI and advanced analytics, safeguarding Personally Identifiable Information (PII) and Patient Health Information (PHI) is paramount. Data masking has become a cornerstone strategy, allowing organizations to securely manage and analyze data while significantly reducing the risks of exposure and misuse.

181 Key Cybersecurity Statistics: Vulnerabilities, Exploits, and Their Impact for 2025

As we enter 2025, the cybersecurity statistics from 2024 and previous years reveal a critical landscape of evolving threats, from a surge in vulnerabilities to increasingly sophisticated cyber-attacks. This blog delves into the latest cybersecurity data, exploring trends like zero-day exploits, and unpatched vulnerabilities, to help you craft a proactive strategy for 2025 cybersecurity challenges.

Preventing WAF Bypass: How AppTrana Protects Origin Servers with Resilient Architecture

A recent discovery by Zafran.io reveals critical vulnerabilities in web application firewalls (WAFs) from providers like Akamai and Cloudflare. Misconfigured origin validation allows attackers to bypass WAF protections and directly access backend servers, creating opportunities for data breaches, DDoS attacks, and more. While most WAF vendors offer IP whitelisting as a solution, implementing it presents significant challenges such as.

Maximizing Security Data in Splunk with Tripwire's New App

In today’s data-driven world, collecting information is just the beginning. The real value lies in transforming raw data into actionable insights that drive decisions. For enterprise security, this means making data not only accessible but also organized, relevant, and easy to analyze.