Firework – Product Brief: Digital Risk Protection Download the product document
Software & Saas
Top 5 human errors that lead to data breaches
Top 5 human errors that lead to data breaches Malicious actors can identify and take advantage of security vulnerabilities in a matter of hours. Security vulnerabilities are an important part of this problem, but do not tell the whole story. … Read More
Solution Brief: Detect Technical Data Leaks
Solution Brief: Technical Data Leaks Detection Download the product document
When Private Photos Don’t Stay Private for Long
When Private Photos Don’t Stay Private for Long It has always been a challenge to securely share photos, videos and messages on the internet. Few applications offer a ‘trust no one’ mode where the shared content benefits from end-to-end encryption, … Read More
Who Lets Access Keys Out?
Who Lets Access Keys Out? Technical data leakage takes on many forms, but often revolves around the publication of passwords or cloud services’ access keys on the internet. Many technical data leakages are not the result of a malicious actor. … Read More
Flare Systems Overview
Flare Systems Overview Download the product document
Webinar Replay: Who is Digital Risk Protection For?
Who Is Digital Risk Protection for? David Hétu, Chief Research Officer at Flare Systems, defined what Digital Risk Protection is and who needs it most. Who is Digital Risk Protection for? The short answer is everyone who stores personal and financial information … Read More
How to decrease false positives when scanning for committed secrets
How to decrease false positives when scanning for committed secrets In 2019, some 10 million developers joined Github and contributed over 44 million repositories in that year alone. Github is the most popular code repository, with 80% of its users … Read More
How Do Company Secrets Get Leaked Online?
How Do Company Secrets Get Leaked Online? Back in 2017, Facebook suffered a source code leak, initially believed to have been the result of either a developer intentionally leaking it or a security loophole in company servers. The source code … Read More
How Much Would a Technical Leak Cost You in Stolen Cloud Resources?
How Much Would a Technical Leak Cost You in Stolen Cloud Resources? If you have ever wondered how cryptocurrencies like bitcoin or monero issue new currency, the answer is through a competition called cryptocurrency mining. This competition is open to … Read More