Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New DLP Tools, Location Insights, Track Network Drives, and More! (v9.0)

CurrentWare version 9.0 is here! This update introduces Advanced HTTPS transparent packet filtering technology, allowing for significant enhancements to the tracking and restriction capabilities of the CurrentWare Suite. By upgrading to CurrentWare v9.0 you will have greater protection against the data security risks of cloud storage services, potentially malicious file downloads, network share drives, and more!

Imperium Markets uses Fireblocks to achieve Australia's first atomic eAUD settlement

Imperium Markets has completed Australia’s first atomic settlement, or the instantaneous swapping of an asset for payment, with the eAUD – issued as central bank digital currency by the Reserve Bank of Australia. Utilizing Fireblocks’ battle-tested tokenization technology, Imperium Markets’ pilot saw two major banks – Westpac and Commonwealth Bank – successfully issue and invest in certificates of deposit.

Mastering Soft Skills in Cybersecurity

Welcome to our cybersecurity channel, where we unravel the power of soft skills essential for success in this field. Discover effective communication techniques, including neuro-linguistic programming and rapport building. Enhance your report-writing abilities for impactful communication in the cybersecurity landscape. Join us to elevate your skills and thrive in the world of cybersecurity!

CIS Critical Security Controls: What Are They and How Can You Meet These Standards?

s cyber threats evolve and business models change, maintaining a mature cybersecurity program can be challenging. You need to be confident that your organization’s current security tools and techniques are effective. A single error or postponement in resolving a software problem can create weaknesses in your IT infrastructure, increasing the likelihood of cyber attacks.

Hackers vs. The Automotive Industry: Vulnerabilities Identified in Hyundai

Technology has greatly transformed the automotive industry, bringing both advancements and new challenges. The reliance on connectivity and software in cars has opened the door to cyber threats, making cybersecurity a crucial concern for the automobile industry. With the increasing complexity of modern cars, there are now around 150 Electronic Control Units (ECUs) and an astonishing 100 million lines of code. Even simple functions like opening car windows require multiple software systems.

Gartner: Where Do I Start With SASE Evaluations: SD-WAN, SSE, Single-Vendor SASE, or Managed SASE?

If you’re starting your SASE evaluation journey, Gartner is here to assist. In a new helpful guide, they delineate how organizations can build their SASE strategy and shortlist vendors. In this blog post, we bring a short recap of their analysis. You can read the entire document here.