Governance, Risk & Compliance

A Beginner’s Guide to PCI DSS 4.0: Requirements 10-12
PCI DSS 4.0 was designed 20 years ago to help reduce the risk of major breaches of card data at financial services firms, retailers and others that store, process and transmit this ...

Microsoft Veeps Ignite Fire Under CrowdStrike
BSODs begone! Redmond business leaders line up to say what’s new in Windows security ...

Evaluating Solidity support in AI coding assistants
By Artem Dinaburg AI-enabled code assistants (like GitHub’s Copilot, Continue.dev, and Tabby) are making software development faster and more productive. Unfortunately, these tools are often bad at Solidity. So we decided to ...

Cyber Crisis Management Plan: Shield for Brand Reputation
Despite advances in security technology, cybersecurity attacks and data breaches are increasingly common as attackers keep discovering new vulnerabilities and infiltration methods. Organizations now understand that a cyberattack or data breach is ...

What is Digital Lending Application (DLA) Audit?
Digital lending has emerged as a game-changer, reshaping the borrowing experience with unprecedented speed, convenience, and accessibility. Gone are the days of endless paperwork and prolonged waiting times—now, individuals can secure loans ...

NIST Clears Backlog of Known Security Flaws but Not All Vulnerabilities
NIST, the embattled agency that analyzes security vulnerabilities, has cleared the backlog of known CVEs that hadn't been processed but needs more time to clear the entire backlog of unanalyzed flaws ...

A Beginner’s Guide to PCI DSS 4.0: Requirements 5-9
Data breaches reached a record high in the US last year, impacting over 350 million individuals. According to one estimate, financial services firms suffered the second highest total of breaches in 2023: ...

Bridging the Gap: The Challenges of IT and OT Convergence
Operational Technology (OT) networks and Industrial Control Systems, the backbone of critical infrastructure, have traditionally operated in isolation and designed more for reliability and efficiency than security. The increasing convergence of IT ...

These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER
‘Bobby’ flaw flagged WONTFIX: Company doesn’t make storage devices now; has zero interest in fixing this catastrophic vulnerability ...

Killing Filecoin nodes
By Simone Monica In January, we identified and reported a vulnerability in the Lotus and Venus clients of the Filecoin network that allowed an attacker to remotely crash a node and trigger ...