fintech security

Deutsche Banken erweitern Krypto-Serviceangebote nach neuem Recht

Die 5. EU-Geldwäscherichtlinie ist am 1. Januar 2020 in Kraft getreten und baut auf die 4. EU-Geldwäscherichtlinie auf. Unter anderem nimmt sie nun auch Anbieter von Kryptowährungen in die Pflicht. Das Gesetz bezieht EU-weit Verkauf und Verwaltung von Bitcoin und anderen Kryptowährungen mit ein.

Die Erweiterung erlaubt Banken, Bitcoin oder Ethereum wie Wert- oder Pfandbriefe zu behandeln. So können dem Kunden alle damit verbundenen Finanztechnologien angeboten werden. Bis jetzt hat nahezu kein einziges deutsches Geldinstitut virtuelle Währungen im Programm – doch das wird sich nun im Zuge des neuen Gesetzes ändern.

Bei der Bundesanstalt für Finanzdienstleistungsaufsicht BaFin sind bereits 40 Anfragen von Banken für die Genehmigung von Krypto-Custody-Lizenzen eingegangen.

Eines der ersten Geldinstitute, das Dienstleistungen im Bereich der Kryptowährungen anbietet, ist die Solarisbank aus Berlin. Sie hat im Dezember vergangenen Jahres die Tochter Solaris Digital Assets gegründet, um sich dem digitalen Anlagenmarkt anzunehmen. Solarisbank ist im Besitz einer vollen Banklizenz und hat ihre Dienste bereits in der Vergangenheit zahlreichen deutschen FinTech-Startups angeboten.

“Digitale Vermögenswerte werden den Finanzmarkt grundlegend ändern” sagt Michael Offermann, geschäftsführender Direktor für Kryptobanking bei Solarisbank. “Sobald Kauf und Verwahrung von Bitcoin einfacher werden, erwarten wir einen starken Zuwachs.”

Der Blockchain-Wert der Industrie knackt Schätzungen zufolge 2023 die 23 Milliarden-Dollar-Marke. Blockchainbasierte Dienste werden also allgegenwärtig sein. Doch das Wachstum der Industrie bringt auch Gefahren mit sich. (-mehr)

Die inhärenten Sicherheitsvorkehrungen von Blockchains können Angriffe auf DLT-Transaktionen abwehren, machen sie jedoch nicht immun. Tatsächlich hat die Distributed-Ledger-Technologie mit Gefahren zu kämpfen, die zentralen Datenbanken fremd sind. Die Liste der Anbieter von Blockchain-Technik, die Opfer von Hackerangriffen geworden sind, wird immer länger.

Während manche Experten die Öffentlichkeit immer wieder daran erinnern, dass DLT gegenwärtigen Datensicherheitslösungen weit voraus ist, glauben andere wiederum, Firmen sollten extra Maßnahmen zur ausreichenden Sicherung ihrer digitalen Vermögenswerte ergreifen. Mit wachsenden Nutzerzahlen von Blockchain- und DLT-basierten Technologien im Regierungs- und Wirtschaftssektor wächst das Bedürfnis, die mit ihrer Nutzung verbundenen Risiken zu diskutieren.

Die zahlreichen Cyberbedrohungen von heute machen Banken zu beliebten Zielen von Cyberattacken wie Credential Stuffing , Phishing und Ransomware. Die gute Nachricht dabei ist, dass bereits bewährte Schritte unternommen werden können, um digitale Vermögenswerte zu sichern.

1. Cloud Security auswerten

Banken können den momentanen Sicherheitszustand der Cloud mit Sicherheitsmaßstäben, best practices und Regelkonformität vergleichen.

2. Cloud Security überwachen

Banken können mithilfe eines Risiko-Management-Tools die Gefahrenerkennung automatisieren – so werden potentielle Gefahren angegangen, bevor sie zum Problem werden.

3. Strenge Richtlinien für das Zugangsmanagement

Banken können sich vor internen Gefahren schützen, indem sie nur denjenigen Mitarbeitern Zugangsrechte garantieren, die sie wirklich brauchen. 

4. Disaster-Recovery-Lösungen

Mit dem richtigen Plan in der Hinterhand können Banken Datenverlust verhindern und die Ausfallzeit nach einer Störung minimieren. Das kann natürlich nur funktionieren, wenn regelmäßige und zahlreiche Backups durchgeführt werden.

5. Daten kryptographisch verschlüsseln

Kryptographische Verschlüsselungen und Sicherung der kryptographischen Schlüssel mit HSM sorgen dafür, dass sensible digitale Vermögenswerte immer geschützt sind – selbst im Falle einer Gefährdung der IT-Struktur einer Bank.

Learn more on digital assets, compliance and cyber security from our experts

Cyber Security Fireside Chat – Coronavirus, Government Backdoor and Cloud Vulnerability

We held a fireside chat with our very own, Andrey Iaremneko, Hub Security CTO and Shterny Isseroff discussing urging cyber security matters

Webinar Video: STO lifecycle and Cyber Security

webinar with our partners at Tokensoft to educate about regulated tokens, blockchain compliance and security.

Tokensoft Partners with Ex-military Cyber firm Hub Security to Provide Ultra-secure Token Platform HSM

Covid-19 prevents people from coming to work and operating the on-premise security systems that controls large amounts of assets. Hub security enables to do that remotely with the same security standard

EY Launches Baseline Protocol, an Open Source Initiative for the Public Ethereum Blockchain

EY announced in early March the launch of its Baseline protocol project. The new initiative is a an open-sourced paackage of blockchain tools that will allow enterprises to build and deploy blockchain-based products securely and privately on the public Ethereum blockchain. The project is part of a joint effort between EY, ConsenSys and Microsoft.

The Baseline protocol leverages several technologies, including zero knowledge proofs, off-chain storage and distributed identity management so that enterprises can define and synchronize processes and agreements using common standards, with full privacy, and without storing sensitive business information on the blockchain itself.

“This initiative builds on that groundwork and starts filling in gaps such as enterprise directories and private business logic so enterprises will be able to run end-to-end processes like procurement with strong privacy,” said Paul Brody, EY Global Blockchain Leader.

The Baseline protocol will also support smart contracts and industry-wide tokenization standards. In doing so, they will enable an ecosystem of interoperable business services. Key process outputs like purchase orders and receivables are tokenized and integrated into the decentralized finance (DeFi) ecosystem.

The initial release of the Baseline protocol includes the process design and key components to enable volume purchase agreements and lays the groundwork for blockchain applications that link supply chain traceability with commerce and financial services.

“With the Baseline protocol, we are developing enterprise processes that are ecosystem ready because they are being built in a truly blockchain-native manner. When delivered on the public Ethereum network, this will drive adoption and the whole ecosystem,” said Yorke Rhodes, Principal Program Manager of Blockchain at Microsoft.

By supporting smart contracts and tokenization, as well as integrating into a DeFi ecosystem, enterprises will have access to an extensive toolbox of resources with which to research and develop blockchain solutions. The protocol enables confidential and complex collaboration between companies and enterprises without leaving sensitive data on-chain.

Heightened Coronavirus Travel Ban Raises Cybersecurity Risks & Threats

While the World Health Organization (WHO) hasn’t declared the novel coronavirus a global pandemic yet, the infectious disease continues to spread at a rapid pace, affecting both the global economy and global health. The virus has been detected inover 85 countries as of Money and data from Johns Hopkins University confirms more than 110,000 cases of the virus attributed to the COVID-19 disease.

In an attempt to control the spread of the virus, we’ve seen an increase in restrictions on travel. Last week the US announced that travelers coming into the US on direct flights from Italy and South Korea will be screened for symptoms, while travelers from China are already being screened. One sector of the tech economy already feeling the immediate impact of the changing policies is industry events. From travel bans to bans of large gatherings, officials are canceling industry conferences left and right; leaving conference organizers, attendees, exhibitors, and sponsors scrambling to make new plans.

But now, due to the coronavirus outbreak and an increase in travel restrictions, the way we work may be undergoing a radical shift. Now more remote workers are working from home than ever as the global workforce shifts to mitigate the spread of COVID-19. Soon the cohorts working from home will grow into armies as the Chinese Lunar New Year comes to an end and Chinese companies begin restarting operations. Now because of the heightened pace of coronavirus’s spread, the return to work is likely to usher in the world’s largest work-from-home experiment. In 2020, working from home is no longer a privilege –– it’s a necessity.

While we won’t know the coronavirus’s effects on the overall nature of work for some time, we do know that working from home lends serious questions to the heightened cybersecurity risk for many InfoSec and IT security employees. Unlike working from the office, working from home often means working in an unsecured environment. This shift’s effect on many working specifically in banking and cloud enterprise should cause alarm. Employees with high-access management permissions should be on high alert as they self-quarantine, especially if they are responsible for accessing highly sensitive financial, business or consumer data without proper endpoint security measures in place.

In another risk, outlined in a December 2019 weekly tech advice column, the FBI’s Portland office released an ominous warning to US homeowners, “Your fridge and your laptop should not be on the same network.” That’s because your most vulnerable IoT devices –– think wireless cameras, baby monitors, smart thermostats and smart locks, all hold unique vulnerabilities that can be easily exploited. It’s no secret in the cybersecurity world that today’s hackers specifically target home IoT devices to gain entry to your home’s wireless network.

The FBI’s best advice for keeping your devices secure and safe? “Keep your most private, sensitive data on a separate system from your other IoT devices.” According to the FBI’s recommendation, you should have two routers at home: one for your IoT devices and another one for your more private devices.

Whatever the future of work may look like, the cybersecurity implications of a home-based workforce cannot be denied. Companies and cybersecurity professionals must mobilize to provide their organization’s workforce with proper cybersec and threat prevention training. In order to mitigate the cyber risks of a home workforce, heightened education and training is needed for the cyber risks associated with the post-corona economy.

Learn more about Hub Security’s miniHSm device and military-grade key management solutions and how they can help you stay secure and protected –– no matter where you’re working from.

What Blockchain-based Projects Need to Consider Before Writing a Single Line of Code

With the explosion of distributed ledger technology (DLT) as a safe and secure solution for transparently handling and sharing information across organizations, many businesses are jumping on the DLT bandwagon. Proponents of the distributed ledger technology known as blockchain consider it to be one of the best ways to secure transactions.

But while blockchains have many desirable features, such as transaction efficiency, there are still other conditions and requirements to consider when leveraging blockchain technology for business. The publication of DTCC’s most recent paper on the matter outlines key risks associated with the use of the nascent technology and an acknowledgment of the many security risks still associated with its use for both small businesses and enterprises alike.

“With the adoption of DLT across the financial services ecosystem likely to continue to increase in the coming years, we need to be certain that all DLT-related security risks are identified and addressed to maintain the safety and stability of the markets,” said Stephen Scharf, Chief Security Officer at DTCC.

With hundreds of new blockchain-based products released each year, many of today’s development teams don’t consider the security risks associated with the use of DLT early enough on in the project development cycle. Infosec usually isn’t on every founder’s mind when they start projects, especially when it comes to pilots. Once things are in the air, often they are forced to take a few steps back once they realize they hadn’t considered security performance and infrastructure from the get-go. Interestingly, the same is often true for blockchain vendors who are in a rush to get their products deployed.

The fact of the matter is, most don’t consider the fact that all blockchains aren’t created equal. It’s important for businesses to be aware of this fact when evaluating whether the technology they’ve chosen will have the proper security measures they require –– both internal and regulatory.

For fintech solutions looking to meet security regulation standards, opting for a simple cloud-based solution often can do more harm than good. Trusting cloud providers can be risky business –– or better yet, a major risk for your business. However you choose to look at it, while many cloud providers promise to keep highly sensitive data secure many also fail to do so as the recent WSJ’s Cloud Hopper investigation revealed.

When establishing a private blockchain, businesses must consider the best platform for deployment. While blockchain has inherent properties that provide security, known vulnerabilities in any infrastructure can be manipulated by those looking to get their hands on yours or your customer’s data.

Ideally, you should have an infrastructure with integrated security that can:

  • Prevent even root users and administrators from accessing privileged information.
  • Prevent illegitimate attempts to change data or applications within the network.
  • Protect encryption keys using the highest-grade security standards.

Considering these capabilities before developing your DLT-based solution will ensure your blockchain network has the added protection it needs to prevent attacks from both within and without.


Learn more on Hub Security blockchain protection

What Is a Hardware Security Module

A hardware security module (HSM) is a dedicated cryptographic processor designed to protect highly critical and sensitive keys and assets. HSMs act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious organizations in the world. This piece of hardware may look small, but is mighty powerful. It has the ability to securely manage, process, and store cryptographic keys inside its hardened, tamper-resistant shell.

40 German Banks Apply to Offer Bitcoin and Ethereum Services

The Fifth European Money Laundering directive came into effect January 1st, which updates a fourth EU Money Laundering Directive to include crypto services. The law would allow for the sale and custody of Bitcoin and other cryptocurrencies across the EU, including Germany.

China’s Central Bank Gets One Step Closer to Launching Its Digital Currency

The People’s Bank of China (PBoC) announced last week that the top-level design of its digital currency is finally complete. The digital currency’s next step is to “follow the principles of stability, security, and control,” said Mu Changchun, head of the digital currency research institute at the PBoC.

Turkish Bank Launches Blockchain Platform for Digital Gold Transfers

Turkey’s Takasbank announced the release of its blockchain-based gold-backed transfer system Dec. 30th. Developed by the Istanbul Clearing, Settlement and Custody Bank, the BiGA Digital Gold trading platform provides banks with a blockchain-based system for the issuance, repayment, and transfer of digitized gold.

Top 5 Cyber Threats Facing Banks in 2020

With all the cyber threats that exist today, banks are more vulnerable than ever to becoming the next victim of a malicious cyberattack. With the growing list of fintech solutions offered in banking and the most recent Cloud Hopper investigation released by WSJ, 2019 was an early indicator of cyberthreats still to come in the year ahead.

According to a new report released by the Federal Reserve Bank of New York, just a single cyberattack targeting one of the largest U.S. banks would likely have a major ripple effect on the global financial system. Even today, with a growing awareness of the cyber-risks involved in a banking sector driven by technology, there’s a greater risk facing banks than ever before.

With all this in mind, here are the top five cyber risks every financial institution should be prepared to defend against in 2020.

1. Credential Stuffing

Credential stuffing is a type of cyberattack that usually targets the personal data of banking customers. Using stolen account credentials, hackers can gain unauthorized access to user accounts using automated large-scale login requests. The stolen information can then be used to bombard websites and servers in order to try to gain access to critical IT infrastructure. This practice is known as credential stuffing.

List of keys and logins are often obtained via the dark web and allows hackers to save lots of time by avoiding the need to play the password guessing game.

“There is an automated process where the hacker can log thousands to millions of breached passwords and usernames using standard web automation tools,” says Brian Brannon, VP of security product strategy for Safe Systems, an IT security firm that works with community and small banks.

Credential stuffing differs from a brute force attack because in credential stuffing operations attackers are often using usernames and passwords that are known to have been good at some point or another. For banks, credential stuffing is an emerging and credible threat that will only get worse as the number of data breaches increases.

2. Cloud Providers

Cloud services come in very useful by helping banks offset IT expenses, boost system uptime and ensure their data is being stored safely. But the promises of the cloud have come with a few hard-earned lessons when it comes to customer data and security.

With so much information stored on the cloud, particularly for the use of public services, cloud providers have become easy targets for malicious attackers looking to gain access to financial institutions. To get a clearer picture of the problem, consider that over 1.4 billion records were lost to data breaches in March 2017 alone –– many of which involved cloud servers.

With the Wall Street Journal’s recent release of their investigation into the global hacking campaign known only as ‘Cloud Hopper,’ the true depth of the risks associated with compromised cloud data couldn’t be more evident, or alarming.

For the Cloud Hopper attack, hackers known as APT10 gained access to cloud service providers, where companies believed their data was being safely stored and protected. Once in, the hackers freely and anonymously hopped from client to client, evading investigator’s attempts to eliminate them for years.

According to WSJ, the attack went far beyond the 14 companies listed in the indictment, stretching across at least a dozen cloud providers, including CGI Group Inc., Tieto Oyj, and International Business Machines Corp.

To make things worse, investigators said many major cloud companies stonewalled clients as to what was happening inside their networks. Contrary to what many bank executives might think, the sole responsibility for protecting corporate data in the cloud lies with the cloud customer, not the service provider. Hence, no cloud provider is legally or contractually obligated to ensure the safety of customer data –– as much as they may promise to do so.

3. Phishing Attacks

Phishing is a common type of cyberattack that’s often used to steal user data, including login credentials and credit card numbers. But lately, there’s been an increase in phishing attacks targeting bank employees. Phishing occurs when an attacker tricks an unsuspecting victim into opening a malicious link, leading to an installation of malware which then freezes the system as part of a ransomware attack.

An attack can have devastating results on a business –– especially a financial institution like a bank. Phishing can be used to gain a foothold in a network as a part of a larger attack like an advanced persistent threat (APT) event. In this scenario, an employee is compromised in order to bypass security perimeters, distribute malware inside a closed environment, or gain privileged access to secured data.

With access to an employee’s email account, cybercriminals can read a bank’s sensitive information, send emails on the bank’s behalf, hack into the employee’s bank accounts, and gain access to internal documents and customer financial information. This can result in millions of dollars worth of damage in both financial and reputational risks for the institution and its employees.

4. Ransomware

Ransomware is a type of malware that encrypts data, making it impossible for the owners of that data to access it unless they pay a hefty fee. In March 2017, the WannaCry virus spread independently through the networks of unpatched Microsoft Windows devices, leaving thousands of computers infected and making off with a total of 327 payments totaling $130,700.

Although ransomware has costs businesses more than $75 billion per year in damages (Datto), ransomware still remains one of the most common forms of cyberattack. Banks remain top targets for ransomware attacks, as cybercriminals follow the money for big payoffs. According to a Kapersky Labs report, cybersecurity statistics show attacks were launched from within more than 190 countries, with financial services the second most targeted industry after healthcare.

Successful ransomware attacks, especially on smaller banks, are the result of a lack of IT resources, outdated security tech and protocols, and inadequate endpoint cyber-protection. To help protect themselves against ransomware, financial institutions should place many uniquely-tailored protection layers throughout their networks –– each one acting as an obstacle to block malicious software attacks.

5. Internet of Things (IoT) Exploitation

While a majority of exploitation attempts stem from software vulnerabilities, they can just as easily begin from vulnerable pieces of hardware. Anything from an employee device to a router connected to an unsecured network can put an entire organization’s digital infrastructure at risk.

For many CISOs, this may sound like preaching to the choir –– but unbeknownst to many is how easily exploitable their IoT devices are since they’re often not required to have the same level of security scrutiny as computers. Unsecured IoT devices, such as, home routers, printers, and IP cameras are all vulnerable to attack.

As institutions continue to connect more gadgetry to the internet, the number of potential security weaknesses on their networks are also more likely to increase. To breach a financial institution, attackers will target insecure devices to create a pathway to other systems. Once they have an entryway from an IoT device, they have full access to the entire network, including all customer data.

Today’s hackers also have the unfavorable ability to easily exploit a bank’s API system since many legacy APIs weren’t designed with the cloud in mind. This leaves many systems vulnerable from the get-go –– and open banking has just been making the problem worse.

What Banks Can Do

If after reading this article, you’re starting to doubt the security of your organization’s IT structure, know you’re not alone. Here are just a few methods you can adopt in order to create a more safe and secure digital landscape and defend against potential cyberthreats.

1. Assess Your Cloud Security

Regularly review your cloud infrastructure to ensure it’s up to date. Assess your cloud security’s current state compared to security benchmarks, best practices and compliance standards.

2. Monitor Your Cloud Security

Use a vulnerability management tool to help you automate threat detection and protect against potential threats before they become a problem.

3. Establish Strict Access Management Policies

By only providing access permissions to employees who require it, you’re ensuring your organization is well-protected from within –– especially if you employ contractors or part-time workers.

4. Establish a Disaster Recovery Plan

Having a plan in place helps you avoid data loss and allows your to minimize downtime after a disruption. This only works if you backup your data regularly and often.

5. Encrypt Your Data

Encrypting your data cryptographically, and protecting the cryptographic keys to that kingdom, ensures your most sensitive digital assets are always protected –– even if your IT structure is critically compromised.

Learn more on HUB Security for banking and digital asset protection


Global ‘Cloud Hopper’ Hacking Campaign Reveals Major Security Gaps in Cloud Security

The Wall Street Journal recently wrote a full-fledged report on their investigation into the state-sponsored Chinese global hacking campaign called ‘Cloud Hopper.’ Its investigation reveals the true depth of the risks associated with compromised cloud data in one of the largest-ever global corporate espionage efforts.

Cybersecurity investigators first identified aspects of the hack in 2016, revealing that cyber-attackers allegedly working for China’s intelligence services stole volumes of intellectual property, security clearance details and other records from dozens of international companies over the past several years.

Hackers, known as APT10 to Western officials and researchers, gained access to cloud service providers where companies believed their data was being safely stored and protected. Once in, the hackers freely and anonymously hopped from client to client, evading investigator’s attempts to eliminate them. For years.

Now the WSJ is reporting that the attack was actually much worse than initially reported –– going far beyond the 14 yet to be named companies listed in the indictment. While most names are still hidden, it’s reported that the hack stretched across at least a dozen cloud providers, including CGI Group Inc., Tieto Oyj, and International Business Machines Corp. (IBM)

Some of the companies targeted include mining company Rio Tinto PLC (RIO), and health-care giant Philips NV. Both had highly-sensitive data compromised in the attack, including mining prospects and sensitive medical data and research. The Journal also uncovered hundreds of firms that had relationships with breached cloud providers, including Philips, American Airlines Group Inc., Deutsche Bank AG, Allianz SE and GlaxoSmithKline PLC.

The Journal found that Hewlett Packard Enterprise Co. (HPE), also compromised in the attack, was so overwhelmed that the cloud company didn’t see the hackers re-enter their clients’ networks –– even as they gave customers the all-clear. Even worse, it’s still unknown if the hackers remain in the companies’ network today. The Journal reviewed data provided by Security Scorecard, a cybersecurity firm, and identified thousands of IP addresses globally still reporting back to APT10’s network between April and mid-November.

FBI Director Chris Wray said that access gained through cloud providers provided hackers with the equivalent of a master key to an entire apartment complex.

What made it worse, was investigators in and out of government said many of the major cloud companies attempted to stonewall clients about what was happening inside their networks. Officials at the Department of Homeland Security grew so frustrated that they’re now reportedly working to revise federal contracts that would force them to comply with future probes.

EY Focuses on Blockchain Security with Launch of Smart Contract Analyzer

rnst & Young (EY) launched its token and smart contract review service. The tool will allow companies and individuals to evaluate smart contracts and tokens for known security risks.

Hub Security HSM & Mini-HSM Demo

Live HSM and minihsm video demo

The Rise of Blockchain Banking

As the financial industry begins its long-awaited move to adaptive blockchain technology, many banks are becoming increasingly open to the use of crypto-based solutions for digitizing assets. It’s no secret the future of banking is digital for many financial institutions looking to modernize their product offerings. It even appears likely we’re headed toward an era of national digital currencies backed by central banks. Hats off to Mike Orcutt.

But HSBC’s decision to be the first financial institution to move $20 billion worth of assets to a blockchain platform is possibly enormously rewarding––– or risky. While the future of blockchain-based platforms such as HSBC’s Digital Vault looks promising, security experts voice growing concerns over the management of such large amounts of digital assets.

While the rise in usage of blockchain technology has made financial asset management more transparent and accessible, the crypto world has seen its fair share of threats over the past decade. From Binance to Bitpoint to Quadriga’s wild story, the industry’s shift in reliance on the blockchain has its own perils.

Blockchains are particularly attractive to hackers since once they gain access to the private keys it’s game over and fraudulent transactions are very difficult to reverse(if at all). While blockchains have unique security features, they also have their unique vulnerabilities. As banks expand their digital solution, they will continue to face continuous ongoing threats to their blockchain infrastructure. As long as vulnerabilities as these exist, banks must learn to embrace innovative solutions that can keep their most sensitive assets secure.

Today we know that marketing tactics which branded blockchain technology as unhackable were simply misleading ––– and wrong. In total, since the beginning of 2017, hackers have stolen nearly $2 billion worth of cryptocurrency, mostly from exchanges, and that’s just what’s revealed publicly. Contrary to popular belief, these attackers aren’t just lone opportunists either, they’re sophisticated cybercrime organizations. According to Chainalysis, just two of these groups, both of which are still active today, have stolen a combined $1 billion from exchanges.

Whether the future of banking relies on the blockchain or paper-tracking is still up for debate. But if history teaches us anything, it’s that we’re still not out of the woods when it comes to protecting our most sensitive piece of data. Even if we’re HSBC.

To learn more and schedule a live demo with Hub Security, Click here.

Request a Demo





Your Digital Assets Are More Vulnerable Thank You Think

We know you know your digital assets are vulnerable. But we’re not sure you realize how much

Scroll to top

JOIN OUR NEWSLETTER

Keep up with cyber security news!