Security researchers say healthcare providers are failing to secure mind boggling amounts of highly sensitive patient medical data. The post Billions of Medical Images Leaked in Huge Privacy Puzzle appeared first on Security Boulevard. Advertise on IT Security News. Read…
Category: Security Boulevard
Six Reasons Why ForgeRock SDKs Make Sense
At ForgeRock, we’re expanding the ease of use of our ForgeRock Identity Platform. Now, if you have ForgeRock Access Manager (AM), Identity Manager (IDM), and Directory Service (DS), your developers can take advantage of our new open source SDKs…
2020 Cybersecurity Trends: Increased Demand for Election Security – The Nation’s Biggest Threat to Democracy in 2020 by
There is great urgency to address security issues and protect the sanctity of our upcoming elections. In 2018, the federal government made available $380M in new funding for states to update the security of their election systems, but the reality…
Predict 2020: A Look at What the New Year Will Bring
The new year is upon us, which means new challenges and new opportunities. What does the future hold for IT and security? Will there be better integration and broader adoption of new technologies, or will we continue to struggle with…
U.S. Healthcare Data Breach Cost $4 Billion in 2019. 2020 Won’t Be Any Better
New research estimates, after all the breach data, is tallied, that by the end of 2019, healthcare-related data breaches will cost the industry $4 billion, and respondents to a recent survey expect those numbers to only increase in the year…
Do Midsized Companies Need a CISO?
Chief information security officer, or CISO for short—it’s a very popular title lately, being added to C-suites at companies of all sizes. It seems corporate boards feel a company isn’t considered serious if it doesn’t have a CISO or similarly…
Iranian Cyber-Attacks, Ring Class-Action Lawsuit, Preventing Calendar SPAM
In episode 103: The US Department of Homeland Security warns of Iranian cyber-attacks, Ring gets hit with a $5 million dollar class action lawsuit, and some quick tips on how to prevent calendar SPAM. ** Show notes and links mentioned…
Robert M. Lee’s & Jeff Haas’ Little Bobby Comics ‘Data Classification Fail’
via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics. The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics ‘Data Classification Fail’ appeared first on Security Boulevard. Advertise on IT Security…
DEF CON 27, Red Team Offensive Village, Nathan Sweaney’s ‘Casting With The Pros: Tips And Tricks’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Red Team Offensive Village, Nathan Sweaney’s ‘Casting With…
DEF CON 27, Red Team Offensive Village, Chris McCoy’s ‘Through The Looking Glass: Own The Data Center’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Red Team Offensive Village, Chris McCoy’s ‘Through The…
How to Rein In Your Unmanaged Cloud in 4 Steps
The prevalence of migration to the cloud highlights the catch-22 of cybersecurity: the security vs. convenience tradeoff. But it doesn’t have to be this way. The post How to Rein In Your Unmanaged Cloud in 4 Steps appeared first on…
DEF CON 27, Red Team Offensive Village, Adrian Sanabria’s ‘Red Team Framework RTF’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Red Team Offensive Village, Adrian Sanabria’s ‘Red Team…
DEF CON 27, Red Team Offensive Village, Charles Herring’s ‘Breaking NBAD And UEBA Detection’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Red Team Offensive Village, Charles Herring’s ‘Breaking NBAD…
State and Local Governments Face Iranian Hacking Threats
On the first Monday of 2020, CNBC reported that “city governments, agencies and companies from coast to coast are on high alert for ramped up cyber activity possibly emanating from Iran. …” And that was just the start of a…
XKCD ‘Star Wars Voyager 1’
via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Star Wars Voyager 1’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: XKCD ‘Star Wars Voyager 1’
Is Google Cloud Identity Premium Right for Your Org?
Google Cloud Identity Premium extends identities used for Google services to third-party web applications. It also has some MDM features. The post Is Google Cloud Identity Premium Right for Your Org? appeared first on JumpCloud. The post Is Google Cloud…
The Marriage of Data Exfiltration and Ransomware
Ransomware and Data Exfiltration are being combined to further complicate the lives of victims. How will this new development shake out? The post The Marriage of Data Exfiltration and Ransomware appeared first on Security Boulevard. Advertise on IT Security…
Checking My 2010 Security Predictions in 2020!
Checking My 2010 Security Predictions in 2020! Advertise on IT Security News. Read the complete article: Checking My 2010 Security Predictions in 2020!
How to Extend Active Directory to the Cloud without Azure
If Azure AD is not your organization’s best choice for extending Active Directory to the cloud, here are a few alternative solutions. The post How to Extend Active Directory to the Cloud without Azure appeared first on JumpCloud. The post…
AWS Cloud Directory Pricing
As IT admins evaluate AWS Cloud Directory, pricing is a leading concern. Let’s break down their pricing model and how it compares to functionality. The post AWS Cloud Directory Pricing appeared first on JumpCloud. The post AWS Cloud Directory Pricing…
Cybersecurity Maturity Model Certification (CMMC) Levels
The CMMC model has five defined levels, each with a set of supporting practices and processes. Practices range from Level 1 (basic cyber hygiene) and to Level 5 (advance/progressive). […] The post Cybersecurity Maturity Model Certification (CMMC) Levels appeared first…
Federally Funded Android Phones Contain Non-Removable Malware: The Government Cheese Of Mobile Devices
Simply Astonishing… The post Federally Funded Android Phones Contain Non-Removable Malware: The Government Cheese Of Mobile Devices appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: Federally Funded Android Phones Contain Non-Removable Malware: The…
FCC Subsidized Sprint Phones Have Malware Preinstalled
The FCC is paying Sprint, in the guise of “Assurance Wireless,” to hand out Unimax Android phones infested with malware. The post FCC Subsidized Sprint Phones Have Malware Preinstalled appeared first on Security Boulevard. Advertise on IT Security News.…
The Joy of Tech® ‘Spaceship Streaming’
via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® Permalink The post The Joy of Tech® ‘Spaceship Streaming’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: The Joy of Tech® ‘Spaceship Streaming’
DEF CON 27, Bio Hacking Village, Turtle Snap’s ‘Malware And Biology’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Bio Hacking Village, Turtle Snap’s ‘Malware And Biology’…
Encryption Will Take Center Stage in 2020
In the past, technology was a topic of discussion primarily among engineers and scientists. Debates would erupt over technology, but they were confined to esoteric conferences, labs or lecture halls. Our connected world has changed all that. Now it’s not…
Researchers Find RDP Abuse Exposes New Fileless-Type Tactic
Recent investigations by Bitdefender security researchers revealed an attack tactic that could be considered fileless, from an endpoint perspective. Abusing the RDP protocol, in the sense that attackers already have legitimate RDP (Remote Desktop Protocol) credentials, means they can set…
Encrypted Traffic Analysis Will Be Mandatory Soon
Although today much of the internet traffic is encrypted, attackers can still exploit it. While the need to examine encrypted traffic is obvious, the way to carry out decryption often remains a conundrum. Decrypting traffic can introduce performance bottlenecks and…
Insight Acquires Armis To Expand Secure Endpoint Service
Armis, a provider of a service through which organizations can discover devices connected to their networks and assess the level of risk they represent, has been acquired by Insight Partners for $1.1 billion in cash. Company CTO Nadir Izrael said…
Making Compliance and Risk Part of DevOps – 2020 Trend #4
In our 2020 Trends blog, Imperva CTO Kunal Anand predicts that fully automated processes will make compliance more rapid and less expensive. As businesses incorporate security into software development lifecycles (SDLC), continuous integration-continuous deployment (CICD) processes will reduce risk and…
Peter Thomas Kirstein, CBE, FREng, DFBCS (1933 – 2020)
Professor Peter Thomas Kirstein, CBE, FREng, DSc, FBCS, FIET, Flnstp (June 20, 1933 – January 8, 2020) was a British computer scientist who played a role in the creation of the Internet. He put the first computer on the ARPANET…
This is Why Keeping Products Secure Is Everyone’s Problem
The Easiest Questions are Sometimes the Hardest to Answer Are your products secure? Today, this is the question on everyone?… The post This is Why Keeping Products Secure Is Everyone’s Problem appeared first on ZeroNorth. The post This is Why…
Geopolitical Cyberstress? Doublecheck Your Basics
With tensions escalating on the global political front, organizations are concerned and wondering what–if anything–they can do to protect their networks and data from being targeted or becoming collateral damage in potential cyber attacks. The post Geopolitical Cyberstress? Doublecheck Your…
DEF CON 27, Bio Hacking Village, Najla Lindsay’s ‘Forensic Science And Information Security Lifetime’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Bio Hacking Village, Najla Lindsay’s ‘Forensic Science And…
XKCD ‘Parenthetical Names’
via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Parenthetical Names’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: XKCD ‘Parenthetical Names’
DEF CON 27, Bio Hacking Village, Wayne Penn’s ‘Amputees And Prosthetics Challenges’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Bio Hacking Village, Wayne Penn’s ‘Amputees And Prosthetics…
Total Cost of Ownership of Azure AD
Many factors and additional services come into play when you calculate the total cost of ownership of Microsoft’s Azure Active Directory. The post Total Cost of Ownership of Azure AD appeared first on JumpCloud. The post Total Cost of Ownership…
Firefox Critical Zero-Day Being Exploited: Patch NOW
Mozilla’s Firefox browser has a nasty bug. Rated “critical,” the vulnerability is being actively exploited in the wild. The post Firefox Critical Zero-Day Being Exploited: Patch NOW appeared first on Security Boulevard. Advertise on IT Security News. Read the complete…
Less than 10% of enterprise email domains are protected from spoofing — is yours?
Flaws in email security are among the leading causes of cybersecurity incidents for many organizations. Whether it’s ransomware, business email compromise (BEC) attacks, or a spear-phishing email that leads to cyber criminals gaining access to sensitive data, email is the…
How to Use Sonatype OSS Index to Identify Security Vulnerabilities
It’s nearly impossible to build a modern application without relying on third-party libraries. Open source software has been an amazing boom to software development. It’s been instrumental in allowing developers to build increasingly more complex applications that make the internet…
Instrumenting Cloud Security to Validate Critical Controls by Tracey Moon
Did you know that as networks and workloads become more dynamic and move across on-prem, edge and multi-environments, they become more vulnerable to an attack? Join us on January 16th at 1pm ET for our webinar with the AFCEA, Instrumenting…
The Importance of Context in Your Third-Party Security Process
The post The Importance of Context in Your Third-Party Security Process appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: The Importance of Context in Your Third-Party Security Process
The Trouble with Student Data Privacy Laws
Student data privacy laws try to protect our children, but confusion still reigns School districts know that educational institutions are key targets for cybercriminals. It would help if there was a clear strategy for protecting our children. However, between the…
API Security a Top Concern for Cybersecurity in 2020
The role of the application programmable interface (API) keeps rising in prominence within the enterprise. And as that happens, so does the risk of APIs as an enterprise attack surface. According to security experts, API security will be a top…
Kick Off 2020 Securely With GravityZone™
Three Major Awards Mark A Milestone for Bitdefender’s Integrated Security Across Endpoint, Network and Cloud! From crippling ransomware attacks to a near-miss of WannaCry 2.0, 2019 has been anything but short of security incidents, with major attacks popping up in…
Rethinking Network Performance and Internal Security
Can a balance be struck between network performance and effective security in organizations? If you consider the state of data breaches and think of it as a battle between security and the bad guys, it doesn’t require much to know…
Accomplishing SOC 2 Type II in the Cloud-Native Kubernetes Era
We’re excited to announce that ShiftLeft has achieved Service Organization Control 2 Type II compliance with zero exceptions. We began this compliance effort 10 months ago. Back in May 2019, we achieved SOC 2 Type I compliance. While this was…
FastMed Improves Urgent Care And Patient Privacy with Idaptive
Idaptive was the remedy for simplifying access to healthcare apps and safeguarding against unauthorized access to patient info. For FastMed Urgent Care, speed and efficiency are about much more than creating operational excellence. It translates into prompt, personal, and high-quality…
Corporate Twisting Of Privacy Laws
Quite likely, the single most important Privacy related paper you should examine. Today’s Must Grok. Permalink The post Corporate Twisting Of Privacy Laws appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: Corporate Twisting…
Citrix ADC and Gateway Remote Code Execution Vulnerability (CVE-2019-19781)
Citrix released a security advisory (CVE-2019-19781) for a remote code execution vulnerability in Citrix Application Delivery Controller (ADC) and Citrix Gateway products. The vulnerability allows an unauthenticated remote attacker to execute arbitrary code on the system. Once exploited, remote attackers…
What is a Threat Attack Surface? And How Can You Minimize Your Risk?
A cyber threat attack surface refers to the digital and physical vulnerabilities in your hardware and software environment. Learn more about threat attack surfaces, why they are a top priority of security professionals, and how a new approach can help…
Pentesting with a Raspberry Pi!
For years now I have been a huge proponent of the Raspberry Pi. I started with a Raspberry Pi 2, which required a USB WiFi dongle for wireless, to a Raspberry Pi 3b with onboard WiFi. Later I would get…
DEF CON 27 Bio Hacking Village, Rachel Smith’s ‘Liven Up: Augmenting Materials’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Bio Hacking Village, Rachel Smith’s ‘Liven Up: Augmenting…
How to Fail at “Know Your Enemy”?!
How to Fail at “Know Your Enemy”?! Advertise on IT Security News. Read the complete article: How to Fail at “Know Your Enemy”?!
XKCD, Alignment Chart Alignment Chart
via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD, Alignment Chart Alignment Chart appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: XKCD, Alignment Chart Alignment Chart
DEF CON 27 Bio Hacking Village, Dr. Harish Manyam – Doctor Hacker Panel
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Bio Hacking Village, Dr. Harish Manyam – Doctor…
Are Hotel Guests Safe From a Data Breach?
The 2018 Starwood Hotels breach is only the latest in a long line of high profile intrusions that hotels have faced. It’s notable primarily for how many customer records were exposed — 500 million worldwide according to parent company Marriott…
New SHA-1 Attack
There’s a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the complexity of collisions…
CipherCloud and Cloudflare solve for the cloud-mobile environment
The cloud-mobile environment that we operate in today is a brave new world for many organizations. Mobile devices, both managed and unmanaged, connecting to cloud apps and infrastructure, that is off premises, render existing security equipment and infrastructure virtually useless.…
The Year Ahead for Kubernetes and Container Security
A new study out conducted among the DevSecOps community shows that Kubernetes use is rapidly growing within the enterprise, and not just within test or development environments. As organizations try to catch their breath with the rapid adoption rate, the…
Secure Enclaves: A New Approach to Cybersecurity
Secure enclaves can help reduce data breaches dramatically and support the value of the cloud securely “The world runs on software” and “software is eating the world” are phrases you have probably heard over the years. No doubt we cannot…
Hackers Are Targeting Your Small Business
We’ve all read the headlines of cyberattacks on big businesses and government entities—hackers swiping millions of credit card details, Social Security numbers and other personal information. But have you thought about what the consequences a cyberattack against your small business…
DEF CON 27, Bio Hacking Village, Alex Pearlman’s ‘DIY Medicine: The Ethics Of Hacking Pharma’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Bio Hacking Village, Alex Pearlman’s ‘DIY Medicine: The…
Spoilsports: The AT&T Gambit
Well, there-they-go-again: The Spoilsports of mandated internet speeds – poo-pooing speed increases under discussion to-and-for the contemplated FCC-led Rural Digital Opportunity Fund – all in the name profits. Read it and Weep, me hearties. Today’s Must Read and a finalist…
Why 2FA SMS is a Bad Idea
Two-factor authentication (2FA) brings an extra layer of security that passwords alone can’t provide. Requiring an extra step for a user to prove their identity reduces the chance of a bad actor gaining access to data. One of the most…
The Joy of Tech®, ‘Social Media, It’s Worse Than We Thought’
via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® Permalink The post The Joy of Tech®, ‘Social Media, It’s Worse Than We Thought’ appeared first on Security Boulevard. Advertise on IT Security News. Read the…
Modernize Active Directory
In the modern era of mixed-platform IT environment, IT admins need more from the services Active Directory offers. It’s time to modernize AD. The post Modernize Active Directory appeared first on JumpCloud. The post Modernize Active Directory appeared first on…
Hold My Beer Mirai – Spinoff Named ‘LiquorBot’ Incorporates Cryptomining
The Mirai botnet that made headlines in 2016 for taking out infrastructure through large-scale network attacks has become a reference point in the security industry for the damage that large IoT botnets can inflict. Since its source code was published…
Hacking the Hackers: Adversarial AI and How to Fight It
Advances in Artificial Intelligence (AI) have led to smarter, more robust network security platforms that are quickly replacing legacy security solutions. The post Hacking the Hackers: Adversarial AI and How to Fight It appeared first on Security Boulevard. Advertise…
6 Things Every Big Data Security Solution Needs
As data-centric security gain mainstream recognition for its ability to protect sensitive data from theft and malicious use, enterprises are faced with choosing a solution from an increasing array of options. However, not all solutions that claim to be data-centric…
The Perfect Phishing Email
Thinking like the bad guys is part of being in cybersecurity. Our ability to anticipate the moves of our opponents is essential, just like in a chess game – except with real business consequences. Drawing on my prediction of worse…
Veracode CEO Sam King Recognized in WomenInc. Magazine’s 2019 Top Influential Corporate Directors
We’re thrilled to announce that Veracode Chief Executive Officer Sam King has been named one of WomenInc. Magazine’s 2019 Most Influential Corporate Directors! Honoring influencers, achievers, and executives, this announcement recognizes women who are making notable contributions to the world…
Collaboration Under PDGM
The new year means the roll out of Patient-Driven Groupings Model (PDGM). It’s the biggest change in Medicare’s payment methodology for home healthcare since the home health Prospective Payment System (PPS) was implemented and, like PPS, means that providers have…
Zeek is Like a Box of LEGO Bricks for Network Security [Q&A with Dr. Ali Hadi]
Dr. Ali Hadi, a professor of cybersecurity, answers our questions and describes the Zeek framework as LEGO bricks for network security. The post Zeek is Like a Box of LEGO Bricks for Network Security [Q&A with Dr. Ali Hadi] appeared…
How Cryptocurrency Could Benefit You
The post How Cryptocurrency Could Benefit You appeared first on CCSI. The post How Cryptocurrency Could Benefit You appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: How Cryptocurrency Could Benefit You
A Quick Guide to SD-WAN Security
Today, nearly every IT decision-maker wants to invest in innovation that will facilitate network performance and agility without compromising security. For many, the answer is SD-WAN. The intersection between security and SD-WAN is critical in keeping data not only accessible…
Industrial Operators on Alert in Wake of U.S. Cyberattack Warning
On January 4th, the U.S. Department of Homeland Security (DHS) issued a National Terrorism Advisory bulletin warning of a potential cyberattack by Iran in the wake of a U.S. drone attack that killed a senior Iranian military commander. Read Nozomi…
Adding MFA to Windows Systems
The password is the top target for attackers, so adding MFA to Windows systems is one of the most important security measures. The post Adding MFA to Windows Systems appeared first on JumpCloud. The post Adding MFA to Windows Systems…
Artificial Intelligence, The True Beginning Occurred In 1912
Leonardo Torres y Quevedo’s fascinating Chess Automata, via History of Computers Well crafted blog entry authored by Professor Herbert Bruderer at the Communication of the ACM blog, detailing the true start of Artificial Intelligence in 1912. ‘If one takes chess…
DEF CON 27, Bio Hacking Village, Nick Titus’ ‘Building A New Decentralized Internet With The Nodes’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Bio Hacking Village, Nick Titus’ ‘Building A New…
London Stock Exchange Outage: A Cyberattack? By Iran?
Secret sources say stock exchange failure might have been caused by a security breach. GCHQ, the “Brisish NSA” are said to be investigating a possible inside job, involving a bogus software update. The post London Stock Exchange Outage: A Cyberattack? By…
XKCD, ‘OK/okay/ok’
via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD, ‘OK/okay/ok’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: XKCD, ‘OK/okay/ok’
Ask the Experts: What will be the biggest cyber security story in 2020?
We asked some experts for their 2020 cyber security predictions. They told us to look out for ransomware, election security, 5G, IoT, regulations, and more. The post Ask the Experts: What will be the biggest cyber security story in 2020?…
Benefits of Automation: Make the Most of Your People
Gone are the days when IT leaders fretted that the benefits of automation would shove people out of jobs. If anything, it’s the opposite: 74% of cybersecurity professionals say that a skills shortage has affected their organizations, continuing a trend…
JumpCloud’s Top 10 Blogs of 2019
As we greet this new decade with fresh goals and holiday leftovers, let’s reflect on the blogs that readers found […] The post JumpCloud’s Top 10 Blogs of 2019 appeared first on JumpCloud. The post JumpCloud’s Top 10 Blogs of…
Menlo Security Transcends the Almost Secure Cybersecurity Paradigm
Companies of all sizes, across all industries, and from every region of the world all seem to follow the same basic cybersecurity strategy. That would make sense if it worked, but businesses continue to cling to an outdated model of…
CCPA – Introduction, Applicability and Recommendations
What is the CCPA and what is its applicability to businesses? The California Consumer Privacy Act (CCPA) of 2018 is a broadly applicable and wide-ranging privacy law that will come into effect on January 1, 2020. The CCPA applies to…
Shielding Applications to Prevent DDoS Attacks
A software-defined perimeter can be an integral tool in protecting against DDoS attacks One common security threat that corporate networks, applications and web-based services have been failing to effectively defend against is distributed denial of service (DDoS) attacks. In this…
A Third of Infosec Pros Believe They’re under Cyber-Attack but Don’t Know Yet
If security incidents in the past few years are any indication, cybersecurity professionals face a bumpy road ahead. While some IT security chiefs are prepared to hang up their boots, many are almost certain their organization is under attack from…
CCPA Class Action Likely Not Too Classy
One of the most significant aspects of the California Consumer Privacy Act (CCPA) is the fact that consumers in California now have the right to sue companies for their losses resulting from data breaches. While this seems significant, in reality,…
DEF CON 27, Bio Hacking Village, ‘Dr. Goldman, Dr. Schwartz & David Guffrey – Impanelled: ‘Medical Simulations Discussion’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Bio Hacking Village, ‘Dr. Goldman, Dr. Schwartz &…
Tech Lessons from Star Wars Movies
My family recently saw “Star Wars: The Rise of Skywalker” in a local movie theater, and we were not disappointed. The characters, action, plot, and almost everything else we experienced, met or exceeded our high expectations. As we were leaving…
Wah-Wah Over Wawa’s Recent Data Security Incident
On December 19, the beloved east coast gas station and convenience store with a strong, dedicated base of consumers announced a massive data security incident. The company confirmed that malware infected its payment processing servers for a period of nine…
DEF CON 27, Bio Hacking Village, Dr Avi Rubin’s ‘Beyond The Firmware: The Attack Surface of a Networked Medical Device’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Bio Hacking Village, Dr Avi Rubin’s ‘Beyond The…
Robert M. Lee’s & Jeff Haas’ Little Bobby Comics, ‘Low Wages, Open Jobs’
via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics. Permalink The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics, ‘Low Wages, Open Jobs’ appeared first…
The Joy of Tech®, ‘Resolution Broken’
via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® Permalink The post The Joy of Tech®, ‘Resolution Broken’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: The Joy of Tech®, ‘Resolution Broken’
DEF CON 27, Bio Hacking Village, Andrea Downing’s ‘A Previvors Story Of Uncovering Massive Zero Day’
Permalink The post DEF CON 27, Bio Hacking Village, Andrea Downing’s ‘A Previvors Story Of Uncovering Massive Zero Day’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: DEF CON 27, Bio Hacking Village,…
DEF CON 27, Bio Hacking Village, Jay Lagario’s – Hacking Wetware With Open Source Software And Hardware’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Bio Hacking Village, Jay Lagario’s – Hacking Wetware…
Understanding Cybersecurity Maturity Model Certification (CMMC)
So, if you haven’t heard or if you are not familiar with the cybersecurity maturity model certification (CMMC), don’t worry about it, we are here to explain it all to you. […] The post Understanding Cybersecurity Maturity Model Certification (CMMC)…
Xiaomi IoT Cameras Leak Private Stills via Google Home Hub
Worried Xiaomi Mijia IP camera users are finding other people’s images displayed on their Google Home Hubs. The problem seems to linked to a botched software update. The post Xiaomi IoT Cameras Leak Private Stills via Google Home Hub appeared first…