Category: Security Boulevard

‘The C-Suite Report’ Simplified: 4 Key Takeaways

Read the original article: ‘The C-Suite Report’ Simplified: 4 Key Takeaways The recently published “The C-Suite Report: The Current and Future State of Cybersecurity” by Forcepoint in partnership with WSJ Intelligence has unearthed a treasure trove of important and interesting…

A Natural Law for Digital Data

Read the original article: A Natural Law for Digital Data Digital data provides the strength and vitality of the Information Age. Bits have as much, if not more, value than comparable assets in the physical world. Losing control of proprietary…

JumpCloud and the CCPA

Read the original article: JumpCloud and the CCPA JumpCloud takes customer privacy seriously. We are GDPR compliant, and we are not subject to CCPA due to AB 25. Learn more in this blog. The post JumpCloud and the CCPA appeared…

Setting Up a Hacker-Proof Infosec Team

Read the original article: Setting Up a Hacker-Proof Infosec Team What’s the rockstar CISO’s favorite song? Smells like Team Spirit! Cheesy jokes aside, if you are or wish to be a rockstar CISO you know that you can’t do it…

What Is Cloud Workload Protection?

Read the original article: What Is Cloud Workload Protection? Cloud usage is increasing rapidly. Analysts forecast growth of 17 percent for the worldwide public cloud services market in 2020 alone. This proliferation comes on top of already widespread cloud adoption.…

Tufinnovate Americas 2020: the new normal

Read the original article: Tufinnovate Americas 2020: the new normal Tufinnovate is back for its fourth year, and this year our annual user conference is taking place virtually. To kick off the event, we heard from CEO Ruvi Kitov on…

Step-by-Step Configuration with GitLab

Read the original article: Step-by-Step Configuration with GitLab You can manage web vulnerabilities internally with Acunetix. However, these vulnerabilities will need to be fixed by developers and the developers may already use an issue management system. Therefore, managing them internally…

Protect Your Organization from the Ransomware Trifecta

Read the original article: Protect Your Organization from the Ransomware Trifecta The first known ransomware attack was in 1989, making ransomware a “senior citizen” in the world of cyberthreats. The malware was delivere… (Feed generated with FetchRSS) The post Protect…

My WHCD exam experience

Read the original article: My WHCD exam experience Introduction My story starts in July in Budapest, summer is hot. Way too hot. I am working in the cozy air-conditioned office room and look at my daily schedule. I have a…

Understanding the Tactics of Ransomware Attacks

Read the original article: Understanding the Tactics of Ransomware Attacks Amid a global pandemic and political unrest, cyberattacks have still managed to grab headlines. Technology is considered critical infrastructure, and when ransomware strikes, it only amplifies the hardships that businesses,…

More Attackers Using Zero Day Exploits

Read the original article: More Attackers Using Zero Day Exploits A new report shows an increase in the use of zero day exploits by cyber criminals, and their use by a more diverse group of cyber criminals. The post More…

Is ‘Secure Immutable Infrastructure’ a Myth?

Read the original article: Is ‘Secure Immutable Infrastructure’ a Myth? The trend to shift left for security, when done right, has generated some positive results. As software development teams seek to deploy software at faster speeds, security teams have concurrently…

Jumping the Migration Hurdle

Read the original article: Jumping the Migration Hurdle There are a number of challenges with cloud migration and issues to consider before you start your cloud transformation journey. The post Jumping the Migration Hurdle appeared first on Security Boulevard.  …

Another Privacy Shield Bites the Dust

Read the original article: Another Privacy Shield Bites the Dust While not outright eliminating the Swiss-U.S. Privacy Shield, the Swiss Data Protection Authority, the Federal Data Protection and Information Commissioner (FDPIC), announced in a position paper on September 8, 2020 that he…

Nexus as a Container Registry

Read the original article: Nexus as a Container Registry Over the last decade, developers have experienced a shift in the way applications and the underlying operating system are packaged and deployed. The rise in usage of Docker containers and Kubernetes…

SOC Quarantine Diaries Ep. 6: Block.One’s Eddie Schwartz

Read the original article: SOC Quarantine Diaries Ep. 6: Block.One’s Eddie Schwartz Audio Version Episode 6 of SOC Quarantine Diaries catches up with security industry luminary Eddie Schwartz, who is CSO of… The post SOC Quarantine Diaries Ep. 6: Block.One’s…

What is a Good Cybersecurity Program? It Varies for Everyone

Read the original article: What is a Good Cybersecurity Program? It Varies for Everyone Schedule a Call What is a Good Cybersecurity Program? Cybersecurity involves protecting information and systems from cyberthreats. Many organizations have taken a reactive approach, assembling various…

Surge in Cyberattacks Puts Manufacturing OT Systems at Risk

Read the original article: Surge in Cyberattacks Puts Manufacturing OT Systems at Risk The fourth industrial revolution has failed to address the extraordinary surge in cyberattacks that put manufacturing OT systems and automation at risk. The post Surge in Cyberattacks…

The Passwordless Enterprise Era

Read the original article: The Passwordless Enterprise Era How ForgeRock and Secret Double Octopus Are Paving the Way for a Passwordless User Journey     We’re living in a world where managing digital identities is becoming an increasingly complex and tedious…

PCI DSS Part 1: Where to Start?

Read the original article: PCI DSS Part 1: Where to Start? PCI DSS compliance doesn’t have to be stressful or unobtainable. Well-founded security practices are crucial to any security plan for achieving PCI compliance. The post PCI DSS Part 1:…

Is Cybersecurity Training on your Back-to-School List?

Read the original article: Is Cybersecurity Training on your Back-to-School List? Virtual learning is an experience many teachers, parents and students have never previously planned for, and it?s creating cybersecurity risks. Acceleration of online education should be viewed as a…

Achieving Zero Trust with Conditional Access

Read the original article: Achieving Zero Trust with Conditional Access JumpCloud’s upcoming Conditional Access policies allow admins to implement device-trust and network-trust practices helping to increase security with ease. The post Achieving Zero Trust with Conditional Access appeared first on…

Too much information?

Read the original article: Too much information? An interesting piece in the Harvard Business Review highlights the one of the challenges information security professionals face when dealing with security awareness; we actively… The post Too much information? appeared first on…

Windows Domain 2 Factor Authentication (2FA)

Read the original article: Windows Domain 2 Factor Authentication (2FA) Windows domains and Active Directory (AD) makes it easy for administrators to control a large number of business PCs and devices from a central location. Today, a huge percentage of enterprises…

New Article on How to Start with DevSecOps

Read the original article: New Article on How to Start with DevSecOps Github just published an informative guide to moving to DevSecOps.The Github article makes good points and provides clarification on how to shift left The post New Article on…

The Heartbleed Bug – Old Bugs Die Hard

Read the original article: The Heartbleed Bug – Old Bugs Die Hard You would think that after several years, a well-known security vulnerability should no longer be found in production systems. It may, therefore, come as a surprise that famous…

Security Code Review of a Banking Trojan — Cerberus

Read the original article: Security Code Review of a Banking Trojan — Cerberus Security Code Review of a Banking Trojan — Cerberus Over a year ago, I started hearing about this new Banking Trojan called Cerberus. The author of this malware reportedly used to…

Learning From the Best: James Collins, CIO in Delaware

Read the original article: Learning From the Best: James Collins, CIO in Delaware When James Collins recently announced that he will be ending his public service career in Delaware government on September 11, 2020, the stories, press releases and accolades…

Daniel Stori’s ‘Signals’

Read the original article: Daniel Stori’s ‘Signals’ via the inimitable Daniel Stori at turnoff.us The post Daniel Stori’s ‘Signals’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the original article: Daniel Stori’s ‘Signals’

Contrast Labs: Blocking Spring View Manipulation Attacks

Read the original article: Contrast Labs: Blocking Spring View Manipulation Attacks   The post Contrast Labs: Blocking Spring View Manipulation Attacks appeared first on Security Boulevard.   Advertise on IT Security News. Read the original article: Contrast Labs: Blocking Spring…

XKCD ‘Stellar Evolution’

Read the original article: XKCD ‘Stellar Evolution’ via the comic delivery system monikered Randall Munroe resident at XKCD! Permalink The post XKCD ‘Stellar Evolution’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the original article: XKCD ‘Stellar Evolution’

The IIA’s New Three Lines Model for Risk Assurance

Read the original article: The IIA’s New Three Lines Model for Risk Assurance For many years, businesses have based their risk management programs upon the Three Lines of Defense model developed … Read More The post The IIA’s New Three…

How Do I Require U2F Keys for MFA?

Read the original article: How Do I Require U2F Keys for MFA? Universal second factor security keys may offer the most secure multi-factor authentication experience for remote work. Learn how to use them here. The post How Do I Require…

The Joy of Tech® ‘Elon Musk’s Brain Chip’

Read the original article: The Joy of Tech® ‘Elon Musk’s Brain Chip’ via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech®! Permalink The post The Joy of Tech® ‘Elon Musk’s Brain Chip’ appeared first on Security Boulevard.   Advertise on IT Security News. Read…

Five Ways Operational Resiliency Drives Opportunity

Read the original article: Five Ways Operational Resiliency Drives Opportunity Some organizations are not only able to survive a barrage of cyberattacks, natural disasters and outbreaks of illness alongside everyday business challenges, but they thrive. Read about five areas that…

Netskope Unveils Free Real-Time Threat Intelligence Exchange

Read the original article: Netskope Unveils Free Real-Time Threat Intelligence Exchange Netskope today launched a Cloud Threat Exchange portal through which it will share threat intelligence with customers and partners for free. Company CTO Krishna Narayanaswamy said the Cloud Threat…

Cleaning up the Active Directory Forest

Read the original article: Cleaning up the Active Directory Forest Used by many organizations and enterprises, Microsoft’s Active Directory (AD) comprises several services that run on Windows Server to manage permissions and access to networked resources. Within the Active Directory…

Video: TryHackMe – Behind the Curtain

Read the original article: Video: TryHackMe – Behind the Curtain Watch Now for Your Very Own Backstage Pass! Video and Slide Deck from EH-Net Live! Aug 2020 With the growing need for security professionals, a huge number of people are…

What JumpCloud Policies Should I Enable?

Read the original article: What JumpCloud Policies Should I Enable? Use GPO-like Policies across Windows, macOS, and Linux machines to set security features or apply uniform configurations. Try JumpCloud Free. The post What JumpCloud Policies Should I Enable? appeared first…

Cobalt Strike: The New Favorite Among Thieves

Read the original article: Cobalt Strike: The New Favorite Among Thieves By Chris Gerritz Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs). The aim,…

Axis Security Named TiE50 Award Winner at TiEcon

Read the original article: Axis Security Named TiE50 Award Winner at TiEcon Application Access Cloud Delivers Zero Trust Application Access with Continuous Security Monitoring SAN MATEO, California – SEPTEMBER 2, 2020 – Axis Security, the secure application access company, today…

Aite Group Research Validates API Security Gaps

Read the original article: Aite Group Research Validates API Security Gaps 2020 is moving into the final quarter and it appears to be the year of the API security incident with MGM, Starbucks, Data Viper and Docker as just a…

Are You Ready for Your PCI DSS Audit This Year?

Read the original article: Are You Ready for Your PCI DSS Audit This Year? Any organisation which stores, processes and transmits credit card data is required to prove compliance with the PCI Data Security Standard (PCI DSS.) Compliance is demonstrated…

The Pandemic of Credential-based Cyberattacks

Read the original article: The Pandemic of Credential-based Cyberattacks The first half of 2020 is barely in the history books, and it is safe to assume that most business leaders are eager to close this chapter. Globally, there remains plenty…

WHY OBSERVABILITY IS THE NEXT BIG THING IN SECURITY

Read the original article: WHY OBSERVABILITY IS THE NEXT BIG THING IN SECURITY Accelerate cloud migrations with security observability across your development life cycle. The post WHY OBSERVABILITY IS THE NEXT BIG THING IN SECURITY appeared first on Security Boulevard.…

Effortlessly Extend Okta Identities to JumpCloud

Read the original article: Effortlessly Extend Okta Identities to JumpCloud Extend your current Okta identities to JumpCloud and give access to resources such as RADIUS and LDAP. JumpCloud is an approved OIN application. The post Effortlessly Extend Okta Identities to…

The Joy of Tech® ‘First Day Of School’

Read the original article: The Joy of Tech® ‘First Day Of School’ via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech®! Permalink The post The Joy of Tech® ‘First Day Of School’ appeared first on Security…

Apple’s Big Brother Attitude Fails to Keep Users Safe

Read the original article: Apple’s Big Brother Attitude Fails to Keep Users Safe Apple’s insistence on “notarizing” apps fails to “give users more confidence,” as Cook’s crew promised. The post Apple’s Big Brother Attitude Fails to Keep Users Safe appeared…

Securing Healthcare Data in a COVID World

Read the original article: Securing Healthcare Data in a COVID World Healthcare data is some of the most personal information any of us have. In the midst of the global pandemic, many people whose information would not have entered medical…

Targeted Attacks Part 1 – OSINT and Reconnaissance

Read the original article: Targeted Attacks Part 1 – OSINT and Reconnaissance In our August monthly episode we start our three part series on targeted attacks. In this episode we focus on OSINT (Open Source Intelligence) and reconnaissance techniques used…

Misinformation Campaigns Rise Thanks to COVID-19

Read the original article: Misinformation Campaigns Rise Thanks to COVID-19 Misinformation abounds during the pandemic. Vigilance and skepticism are the best defense In late January, Clint Watts, senior fellow at the Center for Cyber and Homeland Security at George Washington…

How Security Helps You Win the Race to Digital

Read the original article: How Security Helps You Win the Race to Digital The COVID-19 pandemic has accelerated the race to digital for many organizations, but it is crucial to keep security in mind as you embrace cloud transformation. The…

I’m Joining Securonix

Read the original article: I’m Joining Securonix  I’m very happy to announce today I’m starting my journey with Securonix! I’ve spent the last five years working as an industry analyst, talking to thousands of clients and vendors about their challenges…

XKCD ‘Synonym Date’

Read the original article: XKCD ‘Synonym Date’ Permalink The post XKCD ‘Synonym Date’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the original article: XKCD ‘Synonym Date’