Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fireblocks Expands On-Chain Digital Identity and Programmable Compliance Team

At Fireblocks, a strong commitment to regulatory compliance has always been at the core of our operations. That’s why we’re excited to announce that we’re building out our On-Chain Digital Identity and Programmable Compliance Team, with the strategic appointments of Peter Marton, Director of Digital Identity, and cryptography expert Chaitanya Reddy Konda, Senior Technical Product Manager, Digital Identity and Privacy.

Netskope Threat Coverage: Menorah

In October 2023, Netskope analyzed a malicious Word document and the malware it contained, dubbed “Menorah.” The malware was attributed to an advanced persistent threat group APT34, and was reported to be distributed via spear-phishing. The malicious Office file uses dispersed and obfuscated VBA code to evade detection. The advanced persistent threat group targets users of outdated versions of Microsoft Office, since it does not attempt to bypass the mark of the web security check.

SEC Cybersecurity Disclosure Rules: What You Need to Know

On July 2023, the Securities and Exchange Commission (SEC) implemented a final rule mandating public companies to furnish comprehensive and uniform disclosures pertaining to cybersecurity risk management, strategy, governance, and incidents. We’re going to discuss SEC Cybersecurity Disclosure Rules and What You Need to Know.

Work-From-Home Job Scams You Should Know About

Some common Work-From-Home (WFH) job scams you should be aware of include reshipping job scams, MLM job scams, job placement service scams, envelope stuffing and data entry job scams. Continue reading to learn about the most common work-from-home scams you should be aware of, the signs that point to a work-from-home job scam and how to avoid becoming a victim.

Implement NIST cybersecurity framework with Calico to reduce security risks in Kubernetes environments

According to the CNCF annual survey released in 2022, 96% of organizations are using or evaluating Kubernetes as a platform for their containerized workloads. Containerization has gained popularity as it fosters DevOps culture and provides the agility and flexibility required for faster software release cycles. Kubernetes has crossed the “adoption chasm” to become a mainstream global technology, emerging as the operating system for the cloud.

Moving From Awareness to Action: Living the 4 Themes Cyber Security Awareness Month 2023

October is nearly over, and with it the 20th annual Cybersecurity Awareness Month is coming to a close. As it does, let’s take a moment to review this month’s key themes and provide insight on how to implement any themes that might still be open to-dos.

What is the Probability of a Data Breach?

Cybercrime is on the rise. By 2025, the cost of cybercrime around the world is estimated to escalate to $10.5 trillion, based on a year-over-year increase of 15%. This number represents the potential for the largest transfer of economic wealth in history and exceeds even the total global profits from the illegal drug trade.

City of Philadelphia Announces Hack, Potentially Exposing City Emails

Philly is the most populous city in the United States, hosting more than 1.5 million residents within its borders. The City employs around 30,000 people, fulfilling over 1,000 job categories. Recently, the City discovered suspicious activity within its email system, leading to potential information exposures of those with accessible accounts. If you have a city email account, your information could be at risk for misuse.

The Crucial Link, part two

In my last post, I highlighted what organisations can and should do to improve their cyber resilience. Not only will this help them obtain cyber insurance, but it will also help them retain it as well. Another way to improve your ability to meet cyber insurers’ qualification standards is to leverage outside help through managed service provider (MSP) partnerships.

5 Types of Firewalls for Enhanced Network Security

Firewalls form the first line of defense against intrusive hackers trying to infiltrate internal networks and steal sensitive data. They act as a barrier between networks, clearly defining the perimeters of each. The earliest generation of packet-filter firewalls were rudimentary compared to today’s next-generation firewalls, but cybercrime threats were also less sophisticated. Since then, cybersecurity vendors have added new security features to firewalls in response to emerging cyber threats.