Category: Security Boulevard

Billions of Medical Images Leaked in Huge Privacy Puzzle

Security researchers say healthcare providers are failing to secure mind boggling amounts of highly sensitive patient medical data. The post Billions of Medical Images Leaked in Huge Privacy Puzzle appeared first on Security Boulevard.   Advertise on IT Security News. Read…

Six Reasons Why ForgeRock SDKs Make Sense

  At ForgeRock, we’re expanding the ease of use of our ForgeRock Identity Platform. Now, if you have ForgeRock Access Manager (AM), Identity Manager (IDM), and Directory Service (DS), your developers can take advantage of our new open source SDKs…

Do Midsized Companies Need a CISO?

Chief information security officer, or CISO for short—it’s a very popular title lately, being added to C-suites at companies of all sizes. It seems corporate boards feel a company isn’t considered serious if it doesn’t have a CISO or similarly…

How to Rein In Your Unmanaged Cloud in 4 Steps

The prevalence of migration to the cloud highlights the catch-22 of cybersecurity: the security vs. convenience tradeoff. But it doesn’t have to be this way. The post How to Rein In Your Unmanaged Cloud in 4 Steps appeared first on…

XKCD ‘Star Wars Voyager 1’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Star Wars Voyager 1’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD ‘Star Wars Voyager 1’

Is Google Cloud Identity Premium Right for Your Org?

Google Cloud Identity Premium extends identities used for Google services to third-party web applications. It also has some MDM features. The post Is Google Cloud Identity Premium Right for Your Org? appeared first on JumpCloud. The post Is Google Cloud…

The Marriage of Data Exfiltration and Ransomware

Ransomware and Data Exfiltration are being combined to further complicate the lives of victims. How will this new development shake out? The post The Marriage of Data Exfiltration and Ransomware appeared first on Security Boulevard.   Advertise on IT Security…

AWS Cloud Directory Pricing

As IT admins evaluate AWS Cloud Directory, pricing is a leading concern. Let’s break down their pricing model and how it compares to functionality. The post AWS Cloud Directory Pricing appeared first on JumpCloud. The post AWS Cloud Directory Pricing…

Cybersecurity Maturity Model Certification (CMMC) Levels

The CMMC model has five defined levels, each with a set of supporting practices and processes. Practices range from Level 1 (basic cyber hygiene) and to Level 5 (advance/progressive). […] The post Cybersecurity Maturity Model Certification (CMMC) Levels appeared first…

FCC Subsidized Sprint Phones Have Malware Preinstalled

The FCC is paying Sprint, in the guise of “Assurance Wireless,” to hand out Unimax Android phones infested with malware. The post FCC Subsidized Sprint Phones Have Malware Preinstalled appeared first on Security Boulevard.   Advertise on IT Security News.…

The Joy of Tech® ‘Spaceship Streaming’

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® Permalink The post The Joy of Tech® ‘Spaceship Streaming’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: The Joy of Tech® ‘Spaceship Streaming’

Encryption Will Take Center Stage in 2020

In the past, technology was a topic of discussion primarily among engineers and scientists. Debates would erupt over technology, but they were confined to esoteric conferences, labs or lecture halls. Our connected world has changed all that. Now it’s not…

Researchers Find RDP Abuse Exposes New Fileless-Type Tactic

Recent investigations by Bitdefender security researchers revealed an attack tactic that could be considered fileless, from an endpoint perspective. Abusing the RDP protocol, in the sense that attackers already have legitimate RDP (Remote Desktop Protocol) credentials, means they can set…

Encrypted Traffic Analysis Will Be Mandatory Soon

 Although today much of the internet traffic is encrypted, attackers can still exploit it. While the need to examine encrypted traffic is obvious, the way to carry out decryption often remains a conundrum. Decrypting traffic can introduce performance bottlenecks and…

Making Compliance and Risk Part of DevOps – 2020 Trend #4

In our 2020 Trends blog, Imperva CTO Kunal Anand predicts that fully automated processes will make compliance more rapid and less expensive. As businesses incorporate security into software development lifecycles (SDLC), continuous integration-continuous deployment (CICD) processes will reduce risk and…

Geopolitical Cyberstress? Doublecheck Your Basics

With tensions escalating on the global political front, organizations are concerned and wondering what–if anything–they can do to protect their networks and data from being targeted or becoming collateral damage in potential cyber attacks. The post Geopolitical Cyberstress? Doublecheck Your…

XKCD ‘Parenthetical Names’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Parenthetical Names’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD ‘Parenthetical Names’

Total Cost of Ownership of Azure AD

Many factors and additional services come into play when you calculate the total cost of ownership of Microsoft’s Azure Active Directory. The post Total Cost of Ownership of Azure AD appeared first on JumpCloud. The post Total Cost of Ownership…

Firefox Critical Zero-Day Being Exploited: Patch NOW

Mozilla’s Firefox browser has a nasty bug. Rated “critical,” the vulnerability is being actively exploited in the wild. The post Firefox Critical Zero-Day Being Exploited: Patch NOW appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete…

The Trouble with Student Data Privacy Laws

Student data privacy laws try to protect our children, but confusion still reigns School districts know that educational institutions are key targets for cybercriminals. It would help if there was a clear strategy for protecting our children. However, between the…

API Security a Top Concern for Cybersecurity in 2020

The role of the application programmable interface (API) keeps rising in prominence within the enterprise. And as that happens, so does the risk of APIs as an enterprise attack surface. According to security experts, API security will be a top…

Kick Off 2020 Securely With GravityZone™

Three Major Awards Mark A Milestone for Bitdefender’s Integrated Security Across Endpoint, Network and Cloud! From crippling ransomware attacks to a near-miss of WannaCry 2.0, 2019 has been anything but short of security incidents, with major attacks popping up in…

FastMed Improves Urgent Care And Patient Privacy with Idaptive

Idaptive was the remedy for simplifying access to healthcare apps and safeguarding against unauthorized access to patient info. For FastMed Urgent Care, speed and efficiency are about much more than creating operational excellence. It translates into prompt, personal, and high-quality…

Corporate Twisting Of Privacy Laws

Quite likely, the single most important Privacy related paper you should examine. Today’s Must Grok. Permalink The post Corporate Twisting Of Privacy Laws appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: Corporate Twisting…

Pentesting with a Raspberry Pi!

For years now I have been a huge proponent of the Raspberry Pi.  I started with a Raspberry Pi 2, which required a USB WiFi dongle for wireless, to a Raspberry Pi 3b with onboard WiFi.  Later I would get…

XKCD, Alignment Chart Alignment Chart

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD, Alignment Chart Alignment Chart appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD, Alignment Chart Alignment Chart

Are Hotel Guests Safe From a Data Breach?

The 2018 Starwood Hotels breach is only the latest in a long line of high profile intrusions that hotels have faced. It’s notable primarily for how many customer records were exposed — 500 million worldwide according to parent company Marriott…

New SHA-1 Attack

There’s a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the complexity of collisions…

The Year Ahead for Kubernetes and Container Security

A new study out conducted among the DevSecOps community shows that Kubernetes use is rapidly growing within the enterprise, and not just within test or development environments. As organizations try to catch their breath with the rapid adoption rate, the…

Secure Enclaves: A New Approach to Cybersecurity

Secure enclaves can help reduce data breaches dramatically and support the value of the cloud securely “The world runs on software” and “software is eating the world” are phrases you have probably heard over the years. No doubt we cannot…

Hackers Are Targeting Your Small Business

We’ve all read the headlines of cyberattacks on big businesses and government entities—hackers swiping millions of credit card details, Social Security numbers and other personal information. But have you thought about what the consequences a cyberattack against your small business…

Spoilsports: The AT&T Gambit

Well, there-they-go-again: The Spoilsports of mandated internet speeds – poo-pooing speed increases under discussion to-and-for the contemplated FCC-led Rural Digital Opportunity Fund – all in the name profits. Read it and Weep, me hearties. Today’s Must Read and a finalist…

Why 2FA SMS is a Bad Idea

Two-factor authentication (2FA) brings an extra layer of security that passwords alone can’t provide. Requiring an extra step for a user to prove their identity reduces the chance of a bad actor gaining access to data. One of the most…

Modernize Active Directory

In the modern era of mixed-platform IT environment, IT admins need more from the services Active Directory offers. It’s time to modernize AD. The post Modernize Active Directory appeared first on JumpCloud. The post Modernize Active Directory appeared first on…

Hacking the Hackers: Adversarial AI and How to Fight It

Advances in Artificial Intelligence (AI) have led to smarter, more robust network security platforms that are quickly replacing legacy security solutions. The post Hacking the Hackers: Adversarial AI and How to Fight It appeared first on Security Boulevard.   Advertise…

6 Things Every Big Data Security Solution Needs

As data-centric security gain mainstream recognition for its ability to protect sensitive data from theft and malicious use, enterprises are faced with choosing a solution from an increasing array of options. However, not all solutions that claim to be data-centric…

The Perfect Phishing Email

Thinking like the bad guys is part of being in cybersecurity. Our ability to anticipate the moves of our opponents is essential, just like in a chess game – except with real business consequences. Drawing on my prediction of worse…

Collaboration Under PDGM

The new year means the roll out of Patient-Driven Groupings Model (PDGM). It’s the biggest change in Medicare’s payment methodology for home healthcare since the home health Prospective Payment System (PPS) was implemented and, like PPS, means that providers have…

How Cryptocurrency Could Benefit You

The post How Cryptocurrency Could Benefit You appeared first on CCSI. The post How Cryptocurrency Could Benefit You appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: How Cryptocurrency Could Benefit You

A Quick Guide to SD-WAN Security

Today, nearly every IT decision-maker wants to invest in innovation that will facilitate network performance and agility without compromising security. For many, the answer is SD-WAN. The intersection between security and SD-WAN is critical in keeping data not only accessible…

Adding MFA to Windows Systems

The password is the top target for attackers, so adding MFA to Windows systems is one of the most important security measures. The post Adding MFA to Windows Systems appeared first on JumpCloud. The post Adding MFA to Windows Systems…

London Stock Exchange Outage: A Cyberattack? By Iran?

Secret sources say stock exchange failure might have been caused by a security breach. GCHQ, the “Brisish NSA” are said to be investigating a possible inside job, involving a bogus software update. The post London Stock Exchange Outage: A Cyberattack? By…

XKCD, ‘OK/okay/ok’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD, ‘OK/okay/ok’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD, ‘OK/okay/ok’

Benefits of Automation: Make the Most of Your People

Gone are the days when IT leaders fretted that the benefits of automation would shove people out of jobs. If anything, it’s the opposite: 74% of cybersecurity professionals say that a skills shortage has affected their organizations, continuing a trend…

JumpCloud’s Top 10 Blogs of 2019

As we greet this new decade with fresh goals and holiday leftovers, let’s reflect on the blogs that readers found […] The post JumpCloud’s Top 10 Blogs of 2019 appeared first on JumpCloud. The post JumpCloud’s Top 10 Blogs of…

Shielding Applications to Prevent DDoS Attacks

A software-defined perimeter can be an integral tool in protecting against DDoS attacks One common security threat that corporate networks, applications and web-based services have been failing to effectively defend against is distributed denial of service (DDoS) attacks. In this…

CCPA Class Action Likely Not Too Classy

One of the most significant aspects of the California Consumer Privacy Act (CCPA) is the fact that consumers in California now have the right to sue companies for their losses resulting from data breaches. While this seems significant, in reality,…

Tech Lessons from Star Wars Movies

My family recently saw “Star Wars: The Rise of Skywalker” in a local movie theater, and we were not disappointed. The characters, action, plot, and almost everything else we experienced, met or exceeded our high expectations. As we were leaving…

Wah-Wah Over Wawa’s Recent Data Security Incident

On December 19, the beloved east coast gas station and convenience store with a strong, dedicated base of consumers announced a massive data security incident. The company confirmed that malware infected its payment processing servers for a period of nine…

The Joy of Tech®, ‘Resolution Broken’

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® Permalink The post The Joy of Tech®, ‘Resolution Broken’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: The Joy of Tech®, ‘Resolution Broken’