Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sick of that Security Questionnaire? Automation is the Answer

Security questionnaires (SQs) are not fun. They’re time-consuming, tedious work and sometimes, they’re the one thing standing between you and a closed deal. Fortunately, the emergence of AI in the security space has resulted in many day-to-day workflows being streamlined – with SQs being one of them. Security questionnaire automation solutions have been on the rise.

National Australia Bank executes world-first cross-border stablecoin transaction, powered by Fireblocks

National Australia Bank has completed an intra-bank, cross-border transaction using NAB-issued stablecoins. This represents a world-first by a major financial institution on a layer-one public blockchain (Ethereum). The pilot transaction involved the deployment of stablecoin smart contracts for 7 major global currencies, namely Australian, New Zealand, Singapore and US dollars, Euro, Yen, and Pound Sterling.

VMware ESXi Servers: A Major Attack Vector for Ransomware

In our new threat briefing report, Forescout’s Vedere Labs provides details on the recent ransomware campaign targeting VMware ESXi virtualization servers, or hypervisors, and analyzes two payloads used in these attacks: variants of the Royal and Clop ransomware. We also present the tactics, techniques and procedures (TTPs) used by attackers in this campaign, discuss mitigation recommendations and list indicators of compromise (IOCs) that can be used for detection or threat hunting.

New Content Preview Feature Results in up to 90% Productivity Increase

The Nightfall platform is lauded by customers for its high accuracy detection of sensitive data across a variety of cloud environments. This helps users save time by only surfacing the most relevant and most critical instances of sensitive data exposure. We’re always looking for ways to continue to build value in this area, and many of our feature updates like our new PHI detector and enhanced secrets detection releases accomplish this.

Demystifying SIEM migration: Pitfalls to avoid and tips for ensuring success

Migrating to a new security information and event management (SIEM) solution can feel like a daunting task, like moving to a new house. Over the years, a lot gets accumulated and sometimes is forgotten until found in a corner. This blog identifies steps you can take to reduce the pain typically associated with a migration, tools that can help along the way, and questions you should ask during each phase of a migration.

The Impact of Code Signing on Your Organization

When it comes to releasing software, many organizations take software signing lightly. But they don’t know that not signing a software or not using a Code Signing Certificate can have an adverse impact on the organization. A non-signed application is not only a risk for end-users, but also for the software publisher. And when you sign a software, it offers multiple benefits that positively impact the organizational goals. To understand it more thoroughly, let’s move further.

Behavioral Analytics Explained: How Analyzing (Odd) Behavior Supports Cybersecurity

Behavior Analytics (BA) is a widely used technique that helps you gain insights into various behavioral patterns to make data-driven decisions. This article describes behavior analytics, particularly how it is used in cybersecurity, and the actions it involves. We’ll also provide describe popular BA tools and discuss their key benefits.