Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

1.7 Million Oregon Health Users Lose Their Data to a PH Tech Breach

PH Tech is a specialized services company that works with health insurance companies providing some of their business and administrative services. The company employs 211 people and serves a variety of businesses throughout Oregon and other locations. Because this company manages insurance enrollment, various customer service tasks, and payment services, the organization handles a great deal of personal and medical data that could have been exposed during the latest data breach.

Imperium Markets uses Fireblocks to achieve Australia's first atomic eAUD settlement

Imperium Markets has completed Australia’s first atomic settlement, or the instantaneous swapping of an asset for payment, with the eAUD – issued as central bank digital currency by the Reserve Bank of Australia. Utilizing Fireblocks’ battle-tested tokenization technology, Imperium Markets’ pilot saw two major banks – Westpac and Commonwealth Bank – successfully issue and invest in certificates of deposit.

DevOps Speakeasy with Tracy Ragan

This episode of DevOps Speakeasy features Tracy Ragan, CEO of DeployHub and CDF board member. Ragan joins us to discuss how to secure your DevOps pipeline with new security tools. There has been a security awakening among IT teams around the world. This awakening has resulted in the release of new open source tools that you can use today. From hardening the build process to gathering actionable supply chain intelligence. Her session will review the new generation of open source security tools to incorporate into your security strategy.

Role Explosion: Rethinking Access Control

As the digital landscape expands, organizations are facing a complex challenge: managing access to an ever-growing number of resources, applications, and services. The traditional approach of using identity groups to handle access control is becoming increasingly untenable. So, let's explore the causes behind role explosion and discuss the need for a paradigm shift towards a more scalable and efficient access management strategy. ‍

The state of stateful applications on Kubernetes

Kubernetes has become one of the most popular platforms for running cloud-native applications. This popularity is due to several factors, including its ease of use and ability to handle stateless applications. However, running stateful applications, such as databases and storage systems, on Kubernetes clusters is still debatable. In other words, does Kubernetes and its containerized ecosystem provide a solid and reliable infrastructure to run such critical applications?

Snyk's Sonya Moisset on Proactive Security Measures | Developer-First Security Week

Dive into the world of software security with Sonya Moisset, a distinguished guest at the Developer-First Security Week. As a recognized expert from Snyk, Sonya brings her wealth of knowledge to the forefront, sharing insights, strategies, and best practices for building resilient and secure applications. Explore cutting-edge secure coding and ensure your software stands strong against today's evolving cyber threats.

New AI Bot FraudGPT Hits the Dark Web to Aid Advanced Cybercriminals

Assisting with the creation of spear phishing emails, cracking tools and verifying stolen credit cards, the existence of FraudGPT will only accelerate the frequency and efficiency of attacks. When ChatGPT became available to the public, I warned about its misuse by cybercriminals. Because of the existence of “ethical guardrails” built into tools like ChatGPT, there’s only so far a cybercriminal can use the platform.

Fireblocks' MPC-CMP code is Open-Source

In the pursuit of advancing security and transparency in the digital asset industry, Fireblocks has published our MPC-CMP code as open source under a limited license, along with the rest of our MPC library. As the demand for digital asset custody, tokenization, and Web3 among retail and financial institutions continues to rise, Fireblocks MPC-CMP has proven to be the most secure and reliable key management protocol.