Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

From Phishing to Malware: How to Defend Against a Modern Kill Chain

Every day, threat actors devise new plans for breaking into secure systems. The steps they take, from researching a target to carrying out the attack, are known as the cyber kill chain. Traditionally, that kill chain has targeted devices and networks that lie completely within your organization’s control. For better or worse, mobile and cloud-based work have upended that dynamic.

GitHub actions vs. Jenkins for CI/CD Pipelines

There’s an age-old saying you can tell an engineer’s age by their preferred CI/CD (continuous integration and continuous delivery) tool. Depending on who you talk to, the battle-tested Jenkins remains their weapon of choice, while GitHub Actions is the new kid on the block turning heads. However, here’s something that might surprise you – about half of all developers spend less than 20 hours per week on actual software development tasks.

Setting Guardrails for AI Agents and Copilots

The rapid adoption of AI agents and copilots in enterprise environments has revolutionized how businesses operate, boosting productivity and innovation. We continue to see more and more innovation in this space, between Microsoft Copilot continuing its dominance, and with Salesforce Agentforce recently announced, business users of all technical backgrounds can now even build their own AI agents that act on our behalf.

Enhancing Security in Low-Code Development: Tools and Techniques

Low-code development platforms have revolutionized the way organizations build and deploy applications by enabling rapid innovation and empowering citizen developers. However, this democratization of app creation brings new security challenges that traditional security approaches struggle to address. As businesses increasingly rely on low-code solutions, automating security becomes crucial to maintain an adequate defense against evolving threats.

What is SASE and how it combines WAN and network security solutions into a single cloud model?

Currently valued at a $2 Billion market size, the adoption of Secure Access Service Edge or SASE has soared in the last couple of years and is expected to continue growing for the next 5 years. This is because of its scalability and flexible nature. In this video, our expert, Paul Girardi, explains what it exactly is and how it combines WAN and network security solutions into a single cloud model. He also talks about how it plays a vital role in remote working environments. Watch the full video to know more.

Why Tanium is a Leader in GigaOm's New Patch Management Report for 2024

Patch management is an essential prerequisite for continuous cyber risk mitigation. But it’s not getting any easier. That makes finding the right security partner an essential task for any IT operations leader. But this, too, is fraught with difficulty in a market saturated with vendors. This is where independent market analysis can be invaluable.

Announcing the Fireblocks MPC-BAM Protocol

The Fireblocks Cryptography Research Team has developed MPC-BAM, a new two-party ECDSA MPC protocol that achieves an ideal balance among the three key efficiency metrics in cryptographic protocols: rounds, communication, and computation. Multi-party computation (MPC) cryptography protocols are critical for the decentralized finance (DeFi) ecosystem as they enhance security and privacy while allowing direct custody operations.

Announcing Fireblocks Swaps and Fireblocks Token Allowance Manager

At Fireblocks, our Decentralized Finance mission is to reduce the complexity to access DeFi protocols and protect users when interacting onchain. Interest in Decentralized Finance, or DeFi, is growing rapidly. In fact, the Fireblocks DeFi suite has supported over $22B in DeFi volume in the past 90 days alone and witnessed a 110% surge in DeFi volume between the second and third quarter of this year.

Introducing Fireblocks Key Link: A Seamless Integration for Existing Key Management Solutions

For digital asset businesses, the increased clarity in the global regulatory landscape, driven by frameworks like MiCA and DORA in the EU and from the Hong Kong SFC and Monetary Authority, has been a welcome evolution. It also means that internal and external compliance requirements are growing more complex to manage as digital asset businesses consider expansion strategies and the need to streamline operational plans.

The Quantum Horizon: Shaping the Future of IoT/OT Cybersecurity

The rapid evolution of the Internet of Things (IoT) and Operational Technology (OT) is transforming industries, especially in critical sectors like healthcare. While these innovations promise enhanced efficiency and connectivity, they also expose organisations to a broader and more complex cybersecurity threat landscape. With quantum computing on the horizon, the stakes have never been higher.