Category: Security Boulevard

Box Allies With CrowdStrike to Better Secure Files

A Box, Inc. and CrowdStrike alliance will make tools available to secure files and data shared via Box’s cloud service. The post Box Allies With CrowdStrike to Better Secure Files appeared first on Security Boulevard. This article has been indexed…

Huge DNA PII Leak: 23andMe Must Share the Blame

DNA: Do Not Agree. 23andMe says it’s not a breach—just credential stuffing. I’m not so sure. The post Huge DNA PII Leak: 23andMe Must Share the Blame appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

How Process Automation Can Help Streamline Security

Process automation is one of the most effective strategies businesses can use to enforce a security-centric culture. The post How Process Automation Can Help Streamline Security appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

AI More Helpful Than Harmful in Cybersecurity

The majority of of IT security managers see the use of AI in security tools as helpful rather than a threat they must defend against. The post AI More Helpful Than Harmful in Cybersecurity appeared first on Security Boulevard. This…

Insider Risk Digest: Week 39-40

This Article Insider Risk Digest: Week 39-40 was first published on Signpost Six. | https://www.signpostsix.com/ Insider Highlights: Every two weeks, we bring you a round-up of the cases and stories that caught our attention in the realm of insider risk.…

Improve productivity by slowing down your email

Manage teams better by delaying your email! Improve productivity by slowing down your email. Email programs increasingly include the ability to schedule your emails. You can choose when they are sent – in the future, not the past. (They’re not……

Granular Permission Control: Do Organizations Need it?

The modern workplace is constantly evolving, with organizations of all sizes needing to keep up with the ever-changing landscape. One essential part of ensuring a secure working environment is having the right permission control in place.  Fine-grained permission control is…

SaaS Security in Healthcare: What You Need to Know

The migration to SaaS has resulted in the distribution of valuable data across a number of highly decentralized cloud applications. While the security impact of this shift can be felt across all sectors, it weighs particularly heavily on healthcare—an industry…

Why Risk-Based Authentication Is Essential to a Zero Trust Strategy

Today’s evolving and expanding threat landscape has rendered traditional security measures inadequate for safeguarding sensitive data and systems. Organizations grapple with elevated risks as malicious actors continuously devise new ways to circumvent standard security protocols and exploit vulnerabilities. Additionally, the…

ProtectAI Adds Three Tools to Secure AI Models

Protect AI this week has added three open source tools to detect threats to artificial intelligence (AI) models. The post ProtectAI Adds Three Tools to Secure AI Models appeared first on Security Boulevard. This article has been indexed from Security…

Everything You Need to Know About 5G Security

It’s no secret that the arrival of 5G technology will usher in a new wave… The post Everything You Need to Know About 5G Security appeared first on Entrust Blog. The post Everything You Need to Know About 5G Security…

iPhone/iPad Warning: Update Now to Avoid Zero-Day Pain

Apple’s embarrassing regression: iOS 17.0.3 fixes yet more nasty zero-days (and the overheating bug). The post iPhone/iPad Warning: Update Now to Avoid Zero-Day Pain appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

Generative AI: Cybersecurity’s Ally or Adversary?

While generative AI offers significant benefits, security professionals must remain vigilant to effectively use the tech for cybersecurity. The post Generative AI: Cybersecurity’s Ally or Adversary? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

AI Poses Challenges, Opportunities for IT Security Leaders

Organizations are keen to deploy AI for new revenue growth and productivity initiatives, but threat actors are also ramping up on generative AI-powered attacks. The post AI Poses Challenges, Opportunities for IT Security Leaders appeared first on Security Boulevard. This…

Unseen Costs of Ignoring Cyber Security for Small Business

Cyber attacks pose a significant threat to all businesses, with small businesses being especially valuable. Financially unprepared small firms may suffer significant losses and harm to their reputation, pricing strategy, productivity, staff morale, and other factors in the case of…

Unlocking MDM for Small Business: What you need to know

Introduction Navigating the maze of device management is a common challenge for small businesses. With a diverse range of devices—smartphones, tablets, laptops—each with its own set of applications and security settings, the task becomes increasingly complex. This is where Mobile…

Welcome Wes Wright: Another Great Day at Ordr

Ordr welcomes Wes Wright as our new Chief Healthcare Officer with immense pleasure and pride. Wes’s distinguished military background, extensive expertise in healthcare, and unwavering commitment to patient safety make him an invaluable addition to our organization. Wes’s appointment reflects…

How Healthcare Threats Are Going Low

When it comes to IT and cybersecurity, few industries can compare to Healthcare. A diverse fleet of high-value devices, supporting mission-critical systems, and carrying highly sensitive and regulated data are all just table stakes for most healthcare security teams.  And…

Biometric Authentication for Digital Identity Protection

Identity-based authentication that uses biometrics is a more reliable solution to identity and access management. The post Biometric Authentication for Digital Identity Protection appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…

Insider Identity Risk to Cloud Security

Identity plays a major role in cloud security and can open the door for serious cybersecurity problems from the inside. The post Insider Identity Risk to Cloud Security appeared first on Security Boulevard. This article has been indexed from Security…

IBM Unfurls AI-Powered Managed Threat Detection and Response

IBM today added managed threat detection and response services that leverage artificial intelligence (AI) to identify and thwart cyberattacks. The post IBM Unfurls AI-Powered Managed Threat Detection and Response appeared first on Security Boulevard. This article has been indexed from…

Security Spotlight: Monitoring Virtual Network Computing

The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. In this Security Spotlight, we’ll be talking about monitoring Virtual Network……

Preventing fraud in the iGaming industry

Discover why fraud prevention is vital for iGaming success, and how to protect your business and players. The post Preventing fraud in the iGaming industry appeared first on Sift Blog. The post Preventing fraud in the iGaming industry appeared first…

Play the Password Game!

A clever person has hosted a Password Game. Give it a try! The post Play the Password Game! appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Play the Password Game!

Gartner® Hype Cycle™ for Endpoint Security, 2023

Security Operations leaders must balance increased visibility, better prioritization of risks, and a focus on business outcomes. The post Gartner® Hype Cycle™ for Endpoint Security, 2023 appeared first on SafeBreach. The post Gartner® Hype Cycle™ for Endpoint Security, 2023 appeared…

Automated Incident Response with Rapid7 and Smart SOAR

Integration between platforms has become a necessity rather than a nice-to-have. Smart SOAR offers a single platform to act as the connective tissue between siloed point solutions that do not natively integrate with each other. Specifically, the collaboration between Smart…

Gartner® Hype Cycle™ for Endpoint Security, 2023

Security Operations leaders must balance increased visibility, better prioritization of risks, and a focus on business outcomes. The post Gartner® Hype Cycle™ for Endpoint Security, 2023 appeared first on SafeBreach. The post Gartner® Hype Cycle™ for Endpoint Security, 2023 appeared…

Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnarav – #261 – Midwives

<a class=” sqs-block-image-link ” href=”https://www.comicagile.net/comic/midwives/”> <img alt=”” height=”586″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/0fd49fd0-a69f-4fe7-97bf-77b23caae369/%23261+-+Midwives.png?format=1000w” width=”662″ /> </a><figcaption class=”image-caption-wrapper”> via the respected Software Engineering expertise of Mikkel Noe-Nygaard as well as the lauded Software Engineering and Enterprise Agile Coaching talent of Luxshan Ratnarav at Comic Agilé!…

Two Campaigns Drop Malicious Packages into NPM

The popular NPM code registry continues to be a target of bad actors looking to sneak their malicious packages into open-source code used by software developers. Researchers with Fortinet’s FortiGuard Labs this week said they found almost three dozen malicious…

23 NYCRR 500 Shadow IT SaaS Provisions

Understand what 23 NYCRR 500 requires for shadow IT SaaS governance, data protection, and overall security operational integrity. The post 23 NYCRR 500 Shadow IT SaaS Provisions appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

AWS’ MadPot Honeypot Operation Corrals Threat Actors

Engineers with Amazon Web Services more than a decade ago began developing tools to better collect intelligence on the cyberthreats coming into the giant cloud provider’s IT environment Fast forward to now, and AWS’s sophisticated suite of tools – called…

Broken ARM: Mali Malware Pwns Phones

Exploited in the wild: Yet more use-after-free vulns in Arm’s Mali GPU driver. The post Broken ARM: Mali Malware Pwns Phones appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Broken ARM:…

Akamai Sees Surge of Cyberattacks Aimed at Financial Services

An Akamai report showed cyberattacks against APIs used in the financial services sector have increased 65% year-over-year. The post Akamai Sees Surge of Cyberattacks Aimed at Financial Services appeared first on Security Boulevard. This article has been indexed from Security…

How to Comply with the SEC’s Cyber Reporting Requirements

As of July 2023, the U.S. Securities and Exchange Commission (SEC) has moved to adopt a new cybersecurity rule on risk management, strategy, governance, and incident disclosure by public companies. The new rule requires SEC registrants to disclose material cybersecurity…

Using ML to Accelerate Incident Management

If adopted correctly, AI and ML could advance incident response efforts by spotting errors and vulnerabilities, communicating issues and improving defensive postures. The post Using ML to Accelerate Incident Management appeared first on Security Boulevard. This article has been indexed…

Survey Results: The Proof is in the Passwords

Passwordless Authentication Continues to Fail to Gain Traction Authentication is a cornerstone of cybersecurity, but strategies to reduce the common pitfalls and resulting security risks haven’t evolved. In 2023, the stakes are higher than ever in the digital world, and…

Elliptic Curve Cryptography Explained

Public key infrastructure (PKI) relies on two different cryptographic keys, a public key and a private key, to encrypt and decrypt data. These complex algorithms use mathematical formulas to generate digital certificates with unique digital identities to secure information. Elliptic…

Zero Trust Architecture: Beyond the Buzzword

Everyone’s heard of zero trust architecture, but why has it become best practice for enterprises around the globe? There’s no shortage of cybersecurity buzzwords. Among them, “zero trust” stands out not just as a trendy term, but as a transformative…

How to Stop Phishing Attacks with Protective DNS

Phishing Threats Are Increasing in Scale and Sophistication Phishing remains one of the most dangerous and widespread cybersecurity threats. This blog examines the escalating phishing landscape, shortcomings of common anti-phishing approaches, and why implementing a Protective DNS service as part…

How to Talk So Your CISO Will Listen

To communicate effectively with your CISO, you’ll need to speak their language. Here’s how you can do that. The post How to Talk So Your CISO Will Listen appeared first on Security Boulevard. This article has been indexed from Security…

Boards are Finally Taking Cybersecurity Seriously

It’s time to ensure boards’ interest in cybersecurity goes beyond just conversation and into real action. The post Boards are Finally Taking Cybersecurity Seriously appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

Survey Sees More Cyberattacks Targeting APIs

Despite increased vigilance, most organizations suffered an API security incident in the last 12 months. The post Survey Sees More Cyberattacks Targeting APIs appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…

Navigating the Nuances of the Asia-Pacific PDPA

Fundamental obligations of the Asia-Pacific Personal Data Protection Act (PDPA) for cybersecurity teams In the information age, the significance of data cannot be overstated, and cybersecurity legislation and standards govern its usage around the globe. Data fuels innovations, steers decisions,…

What Does Zero Trust Mean in Data Security?

Almost every heist movie has a sequence where elaborate plans are created to get the plotters past the heavily guarded perimeter of their target facility. Then, once they’re inside, they drop their disguises and walk around like they own the…

CJIS Security Awareness Training Cheat Sheet

Who’s the last organization you’d expect to be a cyberattack victim? If you answered law enforcement, you’d be correct—but the problem is, it’s happening right now. Police and law enforcement agencies are under cyber assault, and these developments put sensitive…

Playing Dress-Up? How to Train to Spot Websites in Disguise

With Halloween approaching, many are ready for ghosts and costumes. But online, the real threat is from websites masquerading as authentic—but aiming to deceive. Spoofed websites are insidious duplicates of genuine sites, aiming to trick users into sharing sensitive data…

Avoid libwebp Electron Woes On macOS With positron

If you’ve got 👀 on this blog (directly, or via syndication) you’d have to have been living under a rock to not know about the libwebp supply chain disaster. An unfortunate casualty of inept programming just happened to be any…