A Beginner’s Guide to PCI DSS 4.0: Requirements 10-12

A Beginner’s Guide to PCI DSS 4.0: Requirements 10-12

| | Compliance, PCI DSS
PCI DSS 4.0 was designed 20 years ago to help reduce the risk of major breaches of card data at financial services firms, retailers and others that store, process and transmit this ...
Evaluating Solidity support in AI coding assistants

Evaluating Solidity support in AI coding assistants

By Artem Dinaburg AI-enabled code assistants (like GitHub’s Copilot, Continue.dev, and Tabby) are making software development faster and more productive. Unfortunately, these tools are often bad at Solidity. So we decided to ...
Cyber Crisis Management Plan: Shield for Brand Reputation

Cyber Crisis Management Plan: Shield for Brand Reputation

| | Compliance, Cyber Security
Despite advances in security technology, cybersecurity attacks and data breaches are increasingly common as attackers keep discovering new vulnerabilities and infiltration methods. Organizations now understand that a cyberattack or data breach is ...
What is Digital Lending Application  (DLA) Audit?

What is Digital Lending Application (DLA) Audit?

| | Compliance
Digital lending has emerged as a game-changer, reshaping the borrowing experience with unprecedented speed, convenience, and accessibility. Gone are the days of endless paperwork and prolonged waiting times—now, individuals can secure loans ...
NIST CSF vulnerabilities ransomware backlog

NIST Clears Backlog of Known Security Flaws but Not All Vulnerabilities

|
NIST, the embattled agency that analyzes security vulnerabilities, has cleared the backlog of known CVEs that hadn't been processed but needs more time to clear the entire backlog of unanalyzed flaws ...
Security Boulevard
A Beginner’s Guide to PCI DSS 4.0: Requirements 5-9

A Beginner’s Guide to PCI DSS 4.0: Requirements 5-9

| | Compliance, PCI DSS
Data breaches reached a record high in the US last year, impacting over 350 million individuals. According to one estimate, financial services firms suffered the second highest total of breaches in 2023: ...
Bridging the Gap: The Challenges of IT and OT Convergence

Bridging the Gap: The Challenges of IT and OT Convergence

Operational Technology (OT) networks and Industrial Control Systems, the backbone of critical infrastructure, have traditionally operated in isolation and designed more for reliability and efficiency than security. The increasing convergence of IT ...
Killing Filecoin nodes

Killing Filecoin nodes

By Simone Monica In January, we identified and reported a vulnerability in the Lotus and Venus clients of the Filecoin network that allowed an attacker to remotely crash a node and trigger ...