Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detecting the undetectable: Building a fraud detection framework with Elastic

Learn how public sector organizations are using Elastic to identify fraudulent activity with rules and anomaly detection jobs fine-tuned for their specific use cases. Every organization faces the challenge of identifying and combating fraud. In the financial services industry, it might be credit card fraud; in the auto insurance space, staged accident fraud; and in the public sector, unemployment, health insurance, or tax fraud.

Searching Certificate Transparency Logs (Part 1)

Every TLS certificate issued by a root Certificate Authority (CA) ends up in one more more publicly accessible logs. These logs, collectively, make up the Certificate Transparency (CT) ecosystem. Unfortunately the logs are not very searchable. You can’t easily type in a domain and find all associated certificates. At CertKit we’re building CT monitoring capabilities to notify our customers when a new certificate is issued.

Cybersecurity vs. cyber resilience: What's the difference and which do you need?

Modern businesses run on software. That software generates data, and that data is often the most valuable part of your entire business. Businesses rightfully understand that they need to protect that data, but they don’t necessarily know what that really means. If you ask any executive whether they need to invest in cybersecurity, they’ll tell you, of course, they do.

What is Cyber Resilience? A Complete Guide for MSPs

Blocking every attack is impossible. The real question is this: how fast can your clients recover when one gets through? The reality is that cyberattacks are no longer a matter of “if” but “when.” For managed service providers (MSPs), this shift has redefined client expectations. While strong cybersecurity measures are essential, they are no longer sufficient on their own. What clients need is cyber resilience. Cyber resilience moves beyond prevention to ensure continuity.

Security Visionaries | A Unified Approach to Identity, Network, and Data Security

In this episode of Security Visionaries, host Max Havey is joined by security leaders from Microsoft and Netskope to discuss how an ideal unified strategy brings together data, network access, and identity. They discuss what's currently "un-unified" about most security stacks and explore the topline benefits, key metrics, and the "non-negotiables" of a truly unified security approach. GUESTS: Sinead O’Donovan, VP of Product Management, Identity and Network Access at Microsoft.

SPARK 2025: Confirmo CEO Anna Strebl on Scaling B2B Stablecoin Payments with Fireblocks

SPARK 2025 | Customer Success Story Discover how Confirmo, a leading B2B stablecoin payment platform, leveraged Fireblocks' infrastructure to scale operations and automate critical processes. In this customer testimonial from SPARK 2025, Anna Strebl, CEO of Confirmo, shares how partnering with Fireblocks for over three years transformed their crypto payment processing operations. Learn how Fireblocks' wallet orchestration, security infrastructure, and automation capabilities helped Confirmo grow from a Bitcoin-focused processor to a stablecoin-first payments platform. Key Topics Covered.