Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Profits and Losses: How DORA Strengthens Financial Services Firms in the EU Before It's Too Late

The Digital Operational Resilience Act (DORA) came into effect on January 17, across the EU. This new regulation aims to fortify the cyber security defences of financial services firms and their suppliers against digital threats. Understanding DORA is crucial for businesses as it unifies cyber security regulations, reducing vulnerabilities and ensuring compliance. In this blog, we'll explore what DORA entails, its key components, and its implications for both EU and UK-based financial institutions.

NIS2 is Here - Understanding the NIS2 Directive and Its Transposition Across Europe

The Network and Information Security Directive (NIS2 Directive) is an important piece of European Union legislation aimed at bolstering cyber security across the member states. NIS2 officially came into force on 17th October, and while some EU member countries have met this deadline, many are still working to fully transpose the legislation.

Using Structured Storytelling for Effective Defense with Microsoft Security Copilot

In my experience, computers are only as smart as the person in front of them. Same with AI. The results are dependent on the prompts given. Today, users typing prompts from their brains into Microsoft Security Copilot may find it hard to get value. Prompts with adequate specificity are difficult to create, let alone repeat.

Risky Business: Working with Third Parties Across the Globe

To show regional differences, BlueVoyant’s latest research report includes C-level executive responses from organizations in the U.S. and Canada, U.K., Continental Europe, and APAC. Singapore had among the lowest reported negative impacts from third-party cyber breaches, while the U.K. had the most. Regional differences play a notable role in shaping how organizations approach and handle third-party cyber risk management (TPRM).

Breakdown of Takedown: An Overview of Tackling Phishing Threats

Every year, more and more companies are confronted with website and email spoofing worldwide. Cyber criminals use fake websites and fake email accounts for phishing, spear phishing and social engineering attacks to commit fraud, redirect web traffic, or manipulate search engine rankings. The disarming, or takedown, of these fake domains is a real challenge for more and more security teams. This is because cyber criminals are becoming increasingly professional in their spoofing activities.
Featured Post

The Role of Cyber Security in Building Supply Chain Resilience and Efficiency

The COVID-19 pandemic exposed significant vulnerabilities in global supply chains. With technology companies scrambling to respond to unprecedented disruptions, it became clear that traditional supply chain models were no longer sufficient. When we look back on the supply chain crisis before and during the pandemic, it is easy to identify the areas of improvement because we now have so much more information and the benefit of hindsight, but during the crisis, it was extremely challenging to find immediate ad-hoc solutions, which clearly illuminated a lack of contingency planning.

Better Together: The Benefits of Combining MXDR and TPRM

Security operations teams face escalating demands to promptly detect and respond to third-party cyber threats, largely due to the increasing number of data breaches occurring within an organization’s supply chain. An effective program to manage this type of cyber risk is essential for safeguarding sensitive data and maintaining business continuity.

From Zelle to Your Wallet: The Mechanics of Third-Party Phishing

Over the past year, BlueVoyant’s cyber threat analysts have identified a significant rise in third-party phishing tactics, most notably with a campaign impersonating the Zelle digital payment service. By mimicking a well-known payment site like Zelle, threat actors can evade detection more effectively while collecting credentials and personally identifiable information (PII) from online users of hundreds of financial institutions.

Forrester Study: BlueVoyant MDR Delivered a 210% Return on Investment for Clients Through Effective Threat Detection and Response, Optimized SecOps Spending, and Reduced Breach Incidence

Organizations’ security operations (SecOps) programs are under increased pressure due to more sophisticated threats, a continually expanding attack surface, and strained internal resources. To help solve these challenges, BlueVoyant MDR delivers 24x7 threat monitoring, detection, hunting, and response powered by advanced automation and human expertise.