Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enterprise Management Associates Report: Information Security and Compliance Future Trends 2024

The cybersecurity industry has seen radical changes over the past year–changes that may alter the trajectory of the industry. In partnership with analyst firm Enterprise Management Associates (EMA), today Keeper announces Information Security and Compliance Future Trends 2024, a report that analyzes recent research and industry data to highlight key shifts in the cybersecurity industry and offer insights into current trends and future directions.

Fireblocks Delivers Enterprise-Grade Custodial Solutions to Gunzilla Games

Fireblocks is pleased to announce its integration with Gunzilla Games to provide advanced custodial solutions for institutional clients and non-custodial wallet options for over 100 million users on the GUNZ blockchain, enhancing the security and autonomy of digital assets within the gaming sector.

Explore the importance of dark web monitoring in enhancing organization cybersecurity and mitigating potential risks

Understanding the Dark Web and its Threats The dark web refers to a part of the internet that is not indexed by search engines and requires specific software, such as Tor, to access. It is a breeding ground for illegal activities, including the sale of stolen data, hacking tools, drugs, and other illicit goods. Organizations need to understand the threats posed by the dark web in order to effectively protect their sensitive information and prevent cyberattacks.

New Research Finds Phishing Scams Targeting Popular PDF Viewer

Several phishing campaigns are targeting users of the Foxit PDF Reader, according to researchers at Check Point. Foxit is a popular alternative to Adobe Acrobat Reader for viewing PDF files. “Check Point Research has identified an unusual pattern of behavior involving PDF exploitation, mainly targeting users of Foxit Reader,” the researchers write. “This exploit triggers security warnings that could deceive unsuspecting users into executing harmful commands.

Secure Your Site: Learn from the Top 10 Cybersecurity Experts of 2024

Companies have needed a website for the last 25 years at least. But where do you host your site? The techies at HostingAdvice decided to create an extremely thorough real-world review site to share their expertise. And clearly, your organization's website is an attack vector and so cybersecurity has become critical.

Guide: What is FedRAMP Tailored and What is The Difference?

In the past, we’ve talked a lot about the various FedRAMP guidelines required to reach either a single Authority to Operate or a generalized Provisional Authority to Operate. One thing that can be said to be common to all of these is that, in general, you’re talking about FedRAMP Moderate Impact Levels when you discuss these kinds of standards and certification processes. This is because around 80% of cloud service providers and offerings are classified as Moderate impact.

Buckle Up: NOAA Predicts "Above-Normal" 2024 Hurricane Season

For businesses operating along the Southern and Eastern Atlantic coast, each hurricane season ushers in a storm front of anxiety and trepidation — in addition to all that wind and rain. And for good reason. According to the National Oceanic and Atmospheric Administration (NOAA), hurricanes are the deadliest and most costly type of weather disaster, responsible for nearly $2.6 trillion in damage since 1980.

The Insider Threat Landscape in 2024

Insider threats pose a substantial risk, stemming from the potential misuse of access granted to employees, contractors, and third-party vendors. These threats, which can be both intentional and accidental, threaten the security of sensitive data and can significantly impact an organization’s financial stability, reputation, and operational efficiency.

The Need for Speed: "Material" Confusion under the SEC's Cyber Rules

This week, the SEC issued a statement addressing some of the rampant confusion and inconsistencies observed under the agency’s new cyber breach disclosure rule. The statement itself addresses a technical securities law requirement, that public companies should only use Item 1.05 of Form 8-K to disclose “material” cyber breach information (instead of making voluntary or immaterial disclosures).

New Charlotte AI Innovations Enable Prompt Collaboration and Demystify Script Analysis

Since CrowdStrike Charlotte AI became generally available, we’ve seen firsthand how genAI can transform security operations, enabling teams to save hours across time-sensitive tasks and accelerate response to match the speed of modern adversaries.