Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Yellow Card Integrates Fireblocks to Streamline Cross-Border Transactions in Africa

Fireblocks has launched support for Yellow Card, Africa’s leading stablecoin on/off ramp, to improve cross-border transactions for both businesses and individuals. By integrating the Fireblocks digital asset infrastructure, Yellow Card seeks to remove obstacles for global corporate treasury in accessing African markets by offering secure and effective on-chain solutions.

Managing the Use of Access Links in SharePoint Online

SharePoint makes collaboration and sharing exceedingly easy — which can put sensitive and regulated content at risk. Accordingly, administrators need to put guardrails in place that facilitate appropriate sharing and prevent data leakage. In SharePoint Online, the primary way for a user to grant access to resources is to share an access link with other people.

Strengthen Anti-Money Laundering (AML) Compliance: Protegrity Empowers Financial Institutions

The “Russian Laundromat” scheme is a notorious example of how complex and far-reaching financial crimes can be. Running from 2010 to 2014, this scheme funneled between $20 billion and $80 billion out of Russia, using a network of shell companies and global banks, many of which were based in Moldova and Latvia. This was not a small operation — it involved around 500 people, many of whom were wealthy Russians, and relied on thousands of transactions to launder the money.

What Steps Are Involved in An ISO 27001 Audit?

As the strongest and most well-recognized security certification around the world, ISO 27001 is a very popular – and very stringent – framework to adhere to. If you’re a business operating anywhere in the world, and you want to achieve security levels that build confidence and open doors with customers and clients who value trust, ISO 27001 is a great option.

The Number of Email-Based Cyber Attacks Detected Surge 239% in 1H 2024

New data shows the most prevalent and obvious path into an organization – email – continues to be exploited by a growing number of cybercriminals. Email is one of those technologies that doesn’t seem willing to be replaced by collaborative tools that connect individuals and organizations – in many cases – in far more productive ways. And because of this, cybercriminals continue to leverage email to gain access to users.

Future-Proofing Cybersecurity: 5 Insights from the Verizon MSI

Your organization’s most vulnerable points of attack are no longer desktops — they’re in the pockets of your employees. Virtually everyone has a mobile device. And, even on the job, we use them for a multitude of tasks. As a result, our devices are packed with critical information, making them rich targets for cybercrime. That crime comes at a high cost.

Friday Flows Episode 33: From Traditional SOAR to Tines Automation: An engineers perspective

FRIDAY FLOWS #33 Pt.1 - From Traditional SOAR to Tines Automation: An Engineers Perspective A longer form episode with Tino Sif Baksh. An experienced SOAR engineer who has been blown away by Tines' capability since joining. This is part 1 of our chat. Three really simple unique things covered here: How SOAR has changed as a technology and automation going from ‘nice to have’ to ‘need to have’. Building rules into the Tines’ Webhook action to reduce noisy alerts. The power using Tines’ email mode within the receive email action to simplify the Phishing Response workflows.

NIS 2 Cybersecurity Risk Management Measures Explained

The Network and Information Systems Directive 2 (NIS 2) is a cornerstone of European cybersecurity regulation, imposing stringent requirements on critical infrastructure sectors. To ensure their resilience, NIS 2 mandates specific cybersecurity risk management measures. Let's break down these ten essential measures and understand their implications.