Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Minna Bank Taps Fireblocks to Explore Stablecoins and Web3 Wallets for Everyday Payments in Japan

Minna Bank (“Minna no Ginko”), Japan’s first digital-native bank and a subsidiary of Fukuoka Financial Group, has announced a landmark initiative to explore how stablecoins and Web3 wallets can transform everyday financial services. In collaboration with Fireblocks, Solana, and TIS, the study will assess the technical and practical applications of stablecoins for real-world payments, trading, and next-generation user experiences.

PCI DSS 4.0 Compliance: A Guide to Requirements 6 & 11

As of March 31, 2025, full enforcement of the PCI DSS 4.0 guidelines is now in effect. This latest version introduces critical updates that strengthen payment card data security across digital environments. Among the most notable changes are requirements that target client-side security, an area that has been largely overlooked until now.

Why your DevSecOps team needs a log management solution

Not all log management and log analysis tools are created equal. With organizations like yours generating large amounts of log data, understanding how to manage, analyze, and secure these log files is key for maintaining system performance, meeting compliance requirements, detecting performance issues, and responding to incidents faster.

What Makes Southeast Asia the "Ground Zero of Cybercrime"?

Author: Bex Bailey Our 2025 Phishing By Industry Benchmarking Report examines why organizations across Asia face some of the highest levels of cybersecurity risk worldwide. In fact, Forrester reveals that organizations in Asia Pacific (APAC) experience an average of 3.5 breaches within a 12-month period versus 2.8 globally. Organizations in the region also experience a cumulative cost of US$2.8 million against the global mean of US$2.7 million.

Migrate from your existing SIEM and quickly onboard security teams with Datadog Cloud SIEM

Many organizations face significant challenges with onboarding teams to a new or existing SIEM. Security teams grapple with escalating expenses tied to data ingestion, storage, and retention at scale. Steep learning curves can make setup an ongoing and frustrating chore, leading to mistakes and gaps in coverage. Further, SIEMs with constrained ecosystem integrations block users from the tools and customizable workflows they need and are comfortable with.

What is a Cloud-Native Security Automation Framework? Benefits & Use Cases

We live in a world where infrastructures reside entirely in the cloud, threats evolve faster than ever, and attackers never sleep. Manual security processes simply can’t keep pace. Cloud-native security automation is the critical solution for organizations to secure large attack surfaces.

17 Security Tips For Hybrid Workers

The days of full remote work may be behind for most of us, but the hybrid work model is stronger than ever. In 2024, approximately 27% of workers in Europe are estimated to be working in a hybrid model, and around 36% in the US are working in a structured hybrid model. Hybrid work models also offer flexibility in their structure, with the different kinds of models companies use being: While hybrid work offers many benefits, what are the risks for hybrid workers in terms of security?

OT Security in Ports: Lessons from the Coast Guard's Latest Warning

The cranes that move goods in and out of America's busiest ports (some of the most essential components of our national logistics chain) are under growing scrutiny. In a newly issued MARSEC Directive 105-5, the U.S. Coast Guard has raised red flags about the cybersecurity risks that come with ship-to-shore (STS) cranes manufactured in China. These cranes, mostly produced by state-owned enterprises like Shanghai Zhenhua Heavy Industries (ZPMC), make up nearly 80% of the STS equipment at U.S. ports.

CVE-2025-20309: Cisco Unified Communications Manager Static SSH Credentials Maximum Severity Vulnerability

On July 2, 2025, Cisco released a security advisory detailing a maximum severity vulnerability (CVE-2025-20309) in Cisco Unified Communications Manager and Unified Communications Manager SME Engineering Special, caused by hard-coded root SSH credentials that cannot be changed or removed.