6 Questions to Plan for Blockchain Security
Blockchain is an effective business strategy that extends beyond the buzz of cryptocurrencies. Businesses are using blockchain for real-time transactions and secure payments at scale. Blockchain deployments vary for every…
Here’s how EASM is filling the gaps missed by AppSec testing solutions
The post Here’s how EASM is filling the gaps missed by AppSec testing solutions appeared first on Detectify Blog.
Short Takes – 3-28-23
Russian gamers race to prevent nuclear ‘war’. CNN.com article. A small dose of FUD. Pull quote: “It’s complete fantasy; just an interactive game hosted in a building in a former…
Review – S 646 Introduced – Hydrogen Technologies
Earlier this month, Sen Coons (D,DE) introduced S 646, the Hydrogen for Industry Act of 2023. The bill would require DOE to establish the ‘Hydrogen Technologies for Heavy Industry Demonstration…
Review – S 885 Introduced – Civilian Cyber Reserve
Earlier this week, Sen Rosen (D,NV) introduced S 885, the Department of Homeland Security Civilian Cybersecurity Reserve Act. The bill would authorize DHS to establish a pilot program for a…
Short Takes – 3-28-23 – Geeky Science Edition
One of the Luckiest Lightning Strikes Ever Recorded. NYTimes.com article. Great high-speed video. Pull quote: “It was not only lightning rods producing these discharges, but also various corners of the…
OMB Approves Medical Device ‘Refusal’ Rule
Yesterday, the OMB’s Office of Information and Regulatory Affairs (OIRA) announced that it had approved a notice from the Food and Drug Administration on “Cybersecurity in Medical Devices: Refuse to…
Cloudflare’s commitment to the 2023 Summit for Democracy
On Tuesday, March 28, 2023, the US Government will launch the Summit for Democracy 2023, following up on the inaugural Summit for Democracy 2021. The Summit is co-hosted by the…
Vulnerabilities: Understand, mitigate, remediate
As the value of data has grown managing vulnerabilities effectively is essential for the success of your organizations’ security and minimizing the impact of successful attacks. But: What are those…
MITRE ATT&CK® Mitigations: Thwarting Cloud Threats With Preventative Policies and Controls
Originally published by Rapid7. Written by James Alaniz. As IT infrastructure has become more and more sophisticated, so too have the techniques and tactics used by bad actors to gain…