Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ledger Connect Attack: What You Need to Know

On December 14, 2023, the Ledger Connect Kit was compromised, allowing attackers to drain users’ wallets on dozens of decentralized apps. Fireblocks’ customers were not impacted by the attack. Fireblocks dApp Protection, the latest security feature in our DeFi solution, detected and prevented customers from unknowingly interacting with the impacted dApps.

UpGuard Summit December 2023 - Panel Discussion

Join our moderator Jessica Aitkin as she sits down with three of our knowledgeable customers, who share their insights into selecting and onboarding a third-party risk management tool. Guest Speakers Colby Cousens - IT Director, Town of Danvers Ziggy Kowalski - Director of Information Security, Hendrickson Steven Lovaas - CISO, Colorado State University System.

How To Protect an Enterprise Database From Privilege Abuse

Organizations can protect their enterprise database from privilege abuse by implementing the Principle of Least Privilege (PoLP), following a zero-trust security approach and investing in a Privileged Access Management (PAM) solution. Continue reading to learn what privilege abuse is, the risks of privilege abuse in an organization and how to prevent it.

How Does a PAM Solution Help Organizations Meet CIP Cyber Security Standards?

The North American Electric Reliability Corporation’s Critical Infrastructure Protection (NERC CIP) standards are a comprehensive set of requirements that ensure the security and reliability of the North American power grid. These standards address both the physical security and cybersecurity of the bulk electric system, mandating measures to protect critical assets from potential threats.