Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Race to Secure Operational Technologies is On

Whether it's because industrial control systems remain quite vulnerable to attacks, or because these systems manage valuable physical resources and uptime is essential—or a bit of both—attackers are increasingly targeting operational technology (OT) and industrial control systems (ICS).

Fireblocks x Cosmos: Institutional Access to the "Internet of Blockchains"

Fireblocks has consistently led the way in providing the fastest and most diverse range of blockchain support. With a growing list of over 60 supported blockchains, Fireblocks enables our customers to securely custody tokens on the latest chains and quickly build innovative services for their customers. Today, we are excited to announce that Fireblocks has expanded our support for the Cosmos ecosystem – delivering custody, DeFi, and staking support across several leading appchains.

Navigating the Cyber Landscape Today: 5 Tips for CISOs by CISOs

The stakes are higher than ever for CISOs. Just one breach can be catastrophic for an organization, and new rules and regulations add even more pressure. We surveyed 200 CISOs on the current landscape, and asked a handful of them for advice on how to overcome today’s challenges. Here are some of the key recommendations for CISOs who are navigating today’s cyber landscape.

Banking Fraud 2024: Key Risks and Strategies for Prevention

As we navigate through 2024, banking fraud continues to evolve, presenting new challenges for financial institutions. Driven by advancements in technology and changing economic conditions, these threats require banks to stay vigilant and adopt robust strategies to protect themselves and their customers.

Q1 2024 Cyber Threat Landscape Report: Insider Threat & Phishing Evolve Under AI Auspices

In Q1 2024, we saw an evolution in techniques used by attackers, some of which may point to longer term trends in the variation and sophistication of attacks faced by organizations. In particular, with regards to phishing, we saw SMS and voice-based tactics being used, which raises concern around the potential for deep fakes and AI-type technologies to further enhance the effectiveness of phishing attacks.

Announcing Vanta's industry-first partnership to automate HITRUST e1

Today we’re excited to announce that Vanta has partnered with HITRUST Services Corp., the leader in cybersecurity assurances, to be the first automated compliance solution for the HITRUST e1 Assessment and reseller of the HITRUST MyCSF platform. Vanta is the first pre-built solution that includes the controls, documents, and policies necessary to demonstrate your commitment to safeguarding data and protected health information (PHI) — all in a way that can be validated by HITRUST. ‍

OSV Scanner vs npm-audit: A detailed comparison of SCA tools

The widespread adoption of external libraries and packages in the modern application development process introduces potential security risks that could impact the entire application. To address this, Software Composition Analysis (SCA) tools like npm-audit and OSV Scanner play an important role.

Leadership Strategies for Risk Reduction, Transparency, and Speed

To respond to the increasing number of federal cybersecurity recommendations and regulations, cybersecurity leaders and their teams need to be confident in the transparency and resiliency of their security processes. The key is a strong and well documented risk management program. This is imperative for the compliance or incident audits that come with regulations.

Unlocking SOC Superpowers: How Next-Gen SIEM Transforms Your Team

CrowdStrike Falcon Next-Gen SIEM transcends the limitations of legacy SIEMs so you can detect and stop breaches faster than ever. It accomplishes this feat in part by upleveling every member of your SOC. Falcon Next-Gen SIEM helps security engineers streamline deployment by providing a growing set of data connectors and the key data they need already in the CrowdStrike Falcon platform. Security analysts, empowered with generative AI and automation, can navigate complex investigations.