Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Penetration Testing for Financial Services: Meeting Compliance and Security Benchmarks

The financial sector has always been a prime target for attackers, but the scale and sophistication of threats have grown exponentially. In just the first half of 2025, over 742 million attacks were recorded across more than 600 global banking and financial services (BFS) sites, averaging 1.2 million attacks per site, a 51% increase compared to the same period in 2024.

The FFIEC retired CAT-here's why financial institutions are turning to CRI

When the Federal Financial Institutions Examination Council (FFIEC) released its Cybersecurity Assessment Tool (CAT) in 2015, it became the industry standard for evaluating cyber readiness. ‍ A decade later, the threat landscape has evolved—and rather than updating the CAT, the FFIEC retired it on August 31, 2025. With CAT no longer the industry's best practice, many financial institutions are asking: What’s next? ‍

CurrentWare v11.0.2 - SIEM Integration, Cost Summary, Idle Exclusion list,and More

CurrentWare version 11.0.2 is here! This update introduces SIEM integration, Workforce Cost Summary to quantify the cost of underutilized employees, Idle Exclusion List to ensure more accurate employee productivity analytics, alert templates to simplify the alert creation process, the ability to block Bluetooth file transfers while allowing Bluetooth audio, and several security fixes based on penetration testing by third-party security consultants. Need help upgrading?

Android Zero Touch Enrollment (ZTE) - An Overview

Imagine a company ordering new Android phones for their sales team. Without the right management solution in place, the IT team would spend hours (sometimes days) unboxing each phone, setting it up, downloading company apps, and repeating the same steps over and over again. The risk? delayed device rollouts and wasted time and energy.

New Era of Crypto Security: Meet Fireblocks Security Posture Management

In traditional cybersecurity, Security Posture Management (SPM) is an essential discipline. Organizations routinely monitor their cloud configurations, SaaS applications, and infrastructure for misconfigurations and vulnerabilities that could expose them to threats. It’s a recognition of a fundamental truth that even the most sophisticated security systems are only as strong as they’re configured to be.

Empower your team: Ultimate guide to employee IS issue response

Even the best-prepared teams can stumble when an information security (IS) issue surfaces; the real risk isn’t just the incident itself, but how quickly and clearly your employees know what to do next. When an alert goes off, every second counts: Who do they call? Which system do they isolate? What’s the escalation path? Without a well-defined, practiced response plan, confusion can spread faster than the threat.

GeoServer CVE-2024-36401: Tailoring a Public PoC to Enable High-Confidence Detection

At Bitsight, one of the responsibilities of the Vulnerability Research team is to develop fingerprinting methods to not only identify exposed services, but also vulnerabilities in those services. When it comes to detecting vulnerabilities, there are increased challenges depending on the complexity of both the vulnerability and the vulnerable service.

The 5 Nightmares Haunting SOCs - and How Torq HyperSOC Puts Them to Rest

The real horror story is happening inside SOCs every single day. Analysts are buried alive under endless alerts. Silent screams when critical threats slip through. Empty chairs as burnout claims another teammate. Here are the five nightmares every SOC analyst knows too well — and how Torq HyperSOC turns them from never-ending sequels into closed cases.

PurePlay DSPM Vendors: What's their second act?

CSPM tools thrived by making cloud posture issues easy to find, but posture alone didn’t stop breaches. The market evolved into CNAPP – uniting posture, runtime, identity, and shift‑left – to deliver protection, not just visibility. DSPM is on the same trajectory: discovery and classification at rest are necessary but insufficient, especially as AI fragments data into shareable snippets that evade label‑centric controls.