Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Overcoming 4 Challenges with Client Onboarding in Financial Services

I still vividly remember the pain and anguish of inefficient, manual client onboarding processes, even though it’s been a few years since I transitioned from being a financial advisor to leading Egnyte’s wealth management and buy-side practice. The mountains of paperwork. Ugh. The endless back-and-forth with clients and the new business department because something was forgotten or not filled out correctly. Ugh. The constant worry of maintaining compliance. Double ugh.

Year of the Snake, Year of the Institution: The Fireblocks 2025 Digital Assets Policy Outlook

With the dynamic start of the new US Presidential Administration, on the heels of our global annual kick-off, and with colleagues across our offices starting Lunar New Year celebrations last week, it’s a good time for Fireblocks to share our outlook on digital assets policy for the rest of the year. Years in our industry are often unprecedented.

Improving Kubernetes Security: Lessons from an Istio Configuration Finding

As a part of our ongoing work to secure cloud computing infrastructure, we delved into the inner workings of some popular Kubernetes add-ons. Our first subject of research was Istio, a popular service mesh add-on. Istio is an open-source service mesh for Kubernetes that manages communication between microservices. It provides traffic management, security, and observability features without requiring code changes.

NIS2 Compliance in 2025: Compliance Doesn't Have to Mean Complexity

The Network and Information Systems Directive 2 (NIS2) is the European Union’s effort to fortify cybersecurity across critical industries and services. Building on the original NIS Directive, NIS2 has broadened its scope, introduced stricter requirements, and placed greater emphasis on supply chain security. Now that the October 2024 transposition deadline has passed, organizations must focus on maintaining compliance and integrating robust cybersecurity measures into their operations.

Digital Shoplifting: Understanding and Combating Online Retail Fraud

According to the British Retail Consortium (BRC), shoplifting in the UK is surging. Reported cases jumped from 3.7 million to 20.4 million within a year. Viral social media clips show brazen daylight shoplifting. Reports quote frustrated shopkeepers afraid to intervene. Experts in retail, law, and economics debate the causes, blaming the economy, policing, organized crime, and justice systems. While physical shoplifting dominates headlines, digital shoplifting is equally bold and costly.

Malvertising: Phishing Edition

Online advertising is inevitable on countless websites and services across the Internet. Some attackers have learned to exploit online advertising services to deliver attacks, sometimes called “malvertising.” There are sophisticated attacks in the wild that capture user credentials – even MFA – with a malicious sponsored link and exploit the resulting access.

How to build your first Smart TV-application

Smart TV apps are at the peak of popularity and represent a great niche for growth. However, not everyone knows how to approach their development correctly. We can assist you with improving an existing product or breaking into this market. Let's dissect the proper strategy to smart TV app development so that it is both successful and easy to implement.