Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OpenAI's GPT Store: What to Know

Many are speculating that at long last, OpenAI’s GPT store is set to go live this week. GPT builders and developers received an email on January 4th notifying them of the launch, which has been rumored for months, and likely only delayed due to the drama that has taken place at the company. This blog will summarize what this means for citizen development and how security teams should approach this new technological breakthrough from the AI giant.

ARMO announces new Slack integration

We’re thrilled to introduce a fresh ARMO app designed exclusively for Slack, delivering notifications directly to the channels where your teams focus on tackling security concerns related to Misconfiguration, Vulnerabilities, and Compliance. This integration ensures that your DevSecOps teams receive timely notifications within their preferred collaboration platform, empowering them to take immediate action.

Improving IoT security with log management

The Internet of Things (IoT) revolution has set the beginning of a new age of data transfer. Each day, a massive number of new devices get added to all kinds of network infrastructures, transferring gargantuan amounts of data back and forth. In the next decade, we expect the number of IoTs to grow to a staggering 207 billion connected devices – practically outnumbering the human population tenfold.

Flipkart launches 3.6 million wallets for Web3 brand engagement program using Fireblocks

India-based e-commerce giant Flipkart is utilizing Fireblocks’ Wallets-as-a-Service to seamlessly create wallets on their FireDrops app, providing a user-friendly and highly integrated Web3 experience for their customers. To date, over 3.6 million active wallets have been created on the platform.

Doing Things the Right Way

Backup immutability. It’s a phrase you may hear a lot. But what is immutability? According to the dictionary definition, it is this; For you, It may simply be a tick box you need to satisfy for cyber insurance policy or a line item on a Request For Proposal document. Regardless of the what or the why it is important to understand how immutability support is an important layer of your organizations’ overall data protection strategy.

Introducing Security Ratings for Telecommunications, Internet Service Providers, and Cloud Providers

Telecommunications, Internet Service Providers, and Cloud Providers are some of the most critical sectors on the planet. They enable global connectivity, provide access to a wealth of information in real time, and transform business operations. As the foundation of modern communication, these industries have ushered in countless innovations and propelled society forward.

Red Flags for Phishing: Verizon Outlines Common Scams to Watch Out For

Verizon has published an article outlining various forms of social engineering attacks, including SMS/text messaging phishing (smishing), voice phishing (vishing), and spear phishing (targeted attacks, often via email). Verizon warns users to be on the lookout for the following red flags: Verizon concludes, “Remember, phishing is common and perpetrators are hoping to catch you with your guard down. But most companies will never proactively reach out to you.

Cybercriminals Celebrate the Holidays with Dark Web Data Dumps, Dubbed "Leaksmas"

Millions of data records and GBs of data from organizations around the globe were made freely available to cybercriminals to coincide with dates around Christmas of 2023. The pressure presented by cybercriminals threatening to publish data on the web is very compelling. After all, what company wants to be responsible for millions of everyday people potentially becoming victims of scams and cyber attacks? That’s right, not a single one.

Another Mortgage Lender Embattled; LoanDepot Faces Disruptions

LoanDepot is one of the nation’s most widespread nonbank mortgage lenders, offering financial solutions and opportunities to homeowners. Based in Irvine, California, LoanDepot allows homeowners to purchase land, refinance it, and strike the best deal in equity costs. After coming into existence in 2010, their history became one of upward growth; two years later, they were licensed in all 50 states and began expansions.

Keeper Security Introduces Granular Sharing Enforcements

Keeper Security is excited to introduce Granular Sharing Enforcements for all products in the Keeper® platform. This feature, an extension of Keeper’s robust existing sharing policies, enables administrators to apply detailed restrictions for record creation and sharing to user roles. By doing so, Keeper Admins can easily enforce the principle of least privilege and simplify compliance.