Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Scale On-chain Transactions with Confidence: Introducing Gasless Transactions

The future of digital assets is built on efficiency, scalability, and seamless operations. As businesses continue to bring more digital asset solutions to market and serve more customers, operational complexity—particularly around gas management—remains a critical challenge. Today, we’re excited to introduce new capabilities that Fireblocks has designed to reduce friction and enable businesses to scale on-chain transactions with confidence.

Understanding Hong Kong's Virtual Asset Trading Platform Licensing: A Strategic Overview

The Securities and Futures Commission (SFC) is the body that regulates Hong Kong’s securities and futures markets. In recent years, the SFC has been placing an increasing focus on regulatory requirements for digital assets, especially for crypto-native firms and already regulated capital market participants.

The Ransomware Threat: Preparing Schools and Libraries for Ransomware Attacks

Ransomware attacks have emerged as a significant threat to educational institutions. Cybercriminals encrypt sensitive data and demand payment for its release, severely disrupting school operations and leading to exorbitant recovery costs for districts. With ransomware tactics continually evolving, the security of the entire U.S. education system is at risk.

Cato XDR: Finally, A Tool Built by People Who Actually Read the Logs!

Ever feel like some tools are designed by people who’ve never had to use them? Like those public restroom hand dryers that leave your hands wetter than before, or CAPTCHAs that make you question if you even know what a bicycle looks like—it’s like a bad joke at our expense. In the 2022 Devo SOC Performance Report, questions were raised about the biggest challenges faced by security operations center (SOC) teams.

Where the Shadows Lie

Shadow technology, regardless of name, is a manifestation of the same issue - unmonitored, unauthorized, or hidden technology operating outside official oversight. Over the past ten years, with the adoption of SaaS services, Shadow IT became a significant concern for security teams. With the more recent explosion of AI tools, we’ve started to hear the term Shadow AI being used for the same reasons.

WatchGuard Endpoint Security Excels in the 2024 Industry Awards and Reports

As businesses settle into the new year, managed service providers (MSPs) should thoroughly review and strengthen their customers' endpoint cybersecurity strategies. According to WatchGuard data, in Q3’2024, endpoint malware detections were up significantly. This is a 300% increase compared to Q2, highlighting the importance of strengthening security measures at this time of year.

What's new in Tines: February 2025 edition

Only allowing one test story at a time when change control is enabled is restricting. That’s why builders can now create multiple drafts in a story. Set changes live faster by duplicating drafts and publishing smaller edits first. And in the spirit of speed and efficiency, easily delete drafts from a story using the API. Read more on change control →

Solving Secrets Management Challenges for NHIs: GitGuardian Integration with HashiCorp Vault

Struggling with vault sprawl and NHI secrets? GitGuardian’s new HashiCorp Vault integration helps cybersecurity teams centralize secrets management, reduce blind spots, and strengthen security for today’s intricate infrastructures.

macOS Security: Understanding Threats and Building Defenses

As macOS becomes more prevalent in businesses, ensuring an application does not expose a user to vulnerabilities or your organization to business risk, is an important part of managing an organization’s risk. These apps often handle sensitive data, manage authentication and access system resources, making them attractive targets for cyber criminals to exploit. MacOS has unique security features that allow developers to build secure applications, but they must be correctly leveraged.