Category: Security Boulevard

Monitor Device Fleets for Compliance

Read the original article: Monitor Device Fleets for Compliance Centralize your compliance needs, including device monitoring for all three major OS, in a cloud directory platform. Try JumpCloud Free. The post Monitor Device Fleets for Compliance appeared first on JumpCloud.…

The Massive Shift to Cyber Crime

Read the original article: The Massive Shift to Cyber Crime There is a cartoon in The New Yorker of March 30, 2020 showing four mobsters, one with a gun, sitting around a table. The caption reads: “For health and safety…

Sonrai CEO: Next Phase of DevSecOps Starts Now

Read the original article: Sonrai CEO: Next Phase of DevSecOps Starts Now Organizations of all sizes need to start shifting toward a new phase of DevSecOps that finally unifies application development and security workflows, according to Sonrai Security CEO Brendan…

Why Hosted Security Matters?

Read the original article: Why Hosted Security Matters? Hosted Security solutions are quick to deploy, operationally friendly, flexible and more effective To choose the best hosted security platform, organizations should look at the ability to detect threats as well as…

How to Improve PCI Compliance and Reduce Technical Debt

Read the original article: How to Improve PCI Compliance and Reduce Technical Debt Paying down technical debt during the pandemic can reap major benefits when operations resume At the very least, the COVID-19 pandemic has disrupted short-term business plans for…

Cybercriminals Increasingly Exploitating Pandemic Trauma

Read the original article: Cybercriminals Increasingly Exploitating Pandemic Trauma The ancient military strategist Sun-Tzu wrote that “in the midst of chaos, there is also opportunity.” He was referring to the ability to point your opponent toward the direction of your…

Daniel Stori’s ‘MTU’

Read the original article: Daniel Stori’s ‘MTU’ via the inimitable Daniel Stori at turnoff.us Permalink The post Daniel Stori’s ‘MTU’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the original article: Daniel Stori’s ‘MTU’

Stay Secure with JumpCloud Support

Read the original article: Stay Secure with JumpCloud Support JumpCloud’s support team uses various methodologies to reduce vulnerabilities like social engineering and help protect your organization. The post Stay Secure with JumpCloud Support appeared first on JumpCloud. The post Stay…

Office Hours Recap: Automate On/Offboarding with JumpCloud

Read the original article: Office Hours Recap: Automate On/Offboarding with JumpCloud Learn how to automate user onboarding and offboarding, as well as manage remote users and devices, with JumpCloud. Try JumpCloud Free today. The post Office Hours Recap: Automate On/Offboarding…

How to Strike Gold in the Land of Continuous Security

Read the original article: How to Strike Gold in the Land of Continuous Security This is our fourth installment of a six-part series dedicated to helping CISOs establish and maintain a successful application… The post How to Strike Gold in…

The Joy of Tech® ‘Car Talk!’

Read the original article: The Joy of Tech® ‘Car Talk!’ via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech®! Permalink The post The Joy of Tech® ‘Car Talk!’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the original article: The…

Importance of malware analysis

Read the original article: Importance of malware analysis Malware analysis is essential for contemporary crimeware analysis in the enterprise. There are too many crimeware variants with too many tricks to obscure their real intent. There were eight million new variants…

Azure Active Directory vs Okta

Read the original article: Azure Active Directory vs Okta While Azure® Active Directory® and Okta® are competitors in SSO, they are two separate tools designed for different needs of IT admins. The post Azure Active Directory vs Okta appeared first…

Data Privacy and COVID-19: What You Need to Know

Read the original article: Data Privacy and COVID-19: What You Need to Know Offering personal information today to help eradicate COVID-19 should not result in a loss of data privacy in the future During the current COVID-19 pandemic, data is…

August ’20 Newsletter

Read the original article: August ’20 Newsletter Check out the August edition of the JumpCloud Newsletter to see what new and exciting features you can use in your Directory-as-a-Service! The post August ’20 Newsletter appeared first on JumpCloud. The post…

XKCD ‘Standard Model Changes’

Read the original article: XKCD ‘Standard Model Changes’ via the comic delivery system monikered Randall Munroe resident at XKCD! Permalink The post XKCD ‘Standard Model Changes’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the original article: XKCD ‘Standard Model…

Agile and Secure SDLC – Best Practices

Read the original article: Agile and Secure SDLC – Best Practices Agile development processes help businesses release software much quicker than it would be possible if using classic design and development cycles such as those based on the waterfall model.…

The Strategic Value of Remote Audits in the WFH Era

Read the original article: The Strategic Value of Remote Audits in the WFH Era With official reports that the U.S. economy has entered a recession, organizations are looking for every opportunity to cut costs and grow their business. And while…

Today’s Jesse James: 21st Century Bank Heists

Read the original article: Today’s Jesse James: 21st Century Bank Heists Banking in the 21st century no longer revolves around visiting your local branch. Doing business with a bank is now mostly online, global and 24/7. It makes sense that…

Blaming the CISO for a Cybersecurity Breach

Read the original article: Blaming the CISO for a Cybersecurity Breach Building a strong cybersecurity posture has never been an easy task, and the increasing complexity of both IT environments and the threat landscape makes it harder than ever. Recent…

The Joy of Tech® ‘Apple’s Epic Response’

Read the original article: The Joy of Tech® ‘Apple’s Epic Response’ via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech®! Permalink The post The Joy of Tech® ‘Apple’s Epic Response’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the original…

On Externalizing Cloud Trust

Read the original article: On Externalizing Cloud Trust Trust is confusing. Many of the cloud security and, in fact, cloud computing discussions ultimately distill to trust. Note that the concept of trust is much broader than cyber security, and even…

Magento Multiversion (1.x/2.x) Backdoor

Read the original article: Magento Multiversion (1.x/2.x) Backdoor The Magento 1 EOL date has already passed, however it’s evident that a large number of websites will continue to use it for the foreseeable future. Unfortunately, attackers are also aware that…

It Lives!

Read the original article: It Lives! Late in 2018 I went to do an update of the WordPress version driving the blog. And, as is prone to happening, something went wrong. I looked at the site, at my own motivation…

Interpretability of Machine Learning Models for Fraud Detection

Read the original article: Interpretability of Machine Learning Models for Fraud Detection In the domain of fraud prevention, there?s extensive use of machine learning based decision models. These models offer flexibility and adjust for new fraud patterns. However, it?s essential…

Better Security Starts With Better Employee Training

Read the original article: Better Security Starts With Better Employee Training Employees continue to be the most significant risk factor when it comes to security. According to a study by Kaspersky Lab, 52% of businesses say employees are their biggest…

Cloud Compliance Frameworks: What You Need to Know

Read the original article: Cloud Compliance Frameworks: What You Need to Know For those who thought data security was hard when business was primarily on-site—welcome to a new age of … Read More The post Cloud Compliance Frameworks: What You…

XKCD ‘Deer Turrets’

Read the original article: XKCD ‘Deer Turrets’ via the comic delivery system monikered Randall Munroe resident at XKCD! Permalink The post XKCD ‘Deer Turrets’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the original article: XKCD ‘Deer Turrets’

Bridgefy FAIL: Insecure for Use in Protests

Read the original article: Bridgefy FAIL: Insecure for Use in Protests Bridgefy, a young naïve startup, built an app for use-case A. But many people used it for use-case B, which needs a radically stronger security posture. The post Bridgefy…

PerimeterX Launches Partner Program to Help Providers Extend Their App Security Portfolio and Safely Accelerate Their Customers’ Digital Transformation

Read the original article: PerimeterX Launches Partner Program to Help Providers Extend Their App Security Portfolio and Safely Accelerate Their Customers’ Digital Transformation Solution Providers, Marketplace and Technology Providers Can Now Address Automated Attacks and Client-side Threats with Award-winning App…

Election Security in the Crosshairs

Read the original article: Election Security in the Crosshairs It?s time to address the security and risk strategies for mitigating the threats facing the democratic election process to help improve voter confidence. The post Election Security in the Crosshairs appeared…

Social Media Account Discovery With Genymotion

Read the original article: Social Media Account Discovery With Genymotion How can you identify social media accounts through the “suggested friends” function? A practical guide from Authentic8 for OSINT researchers shows the steps The post Social Media Account Discovery With…

Stop Treating Your Data Center Like a Block Tower

Read the original article: Stop Treating Your Data Center Like a Block Tower Today, data centers are taking on new shapes and sizes and are existing in all-new locations, from traditional on-site operations to subsea locations with special cooling mechanisms.…

There But Not There: Phishing Emails Using Invisible Text

Read the original article: There But Not There: Phishing Emails Using Invisible Text We’re used to hackers slipping malicious links and attachments into phishing emails. That doesn’t mean there aren’t the occasional slip-ups that result in malware infections, but for…

Prevent ATO Attacks During the COVID-19 Pandemic

Read the original article: Prevent ATO Attacks During the COVID-19 Pandemic Office 365 and G Suite administrators need to ensure SaaS data protection during COVID-19 and prevent dark web cybercriminals from deploying Account Takeover (ATO) attacks. The post Prevent ATO…

James Mattis’ (GEN USMC Ret, SECDEF) Coronavirus Public Service Announcement

Read the original article: James Mattis’ (GEN USMC Ret, SECDEF) Coronavirus Public Service Announcement *** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.infosecurity.us/blog/2020/8/24/james-mattis-gen-usmc-ret-secdef-coronavirus-public-service-announcement The post James Mattis’ (GEN…

Bricata and Garland Technology Announce Partnership

Read the original article: Bricata and Garland Technology Announce Partnership Technology Partnership delivers total network visibility and threat hunting to accelerate detection and response  NEW YORK, August 20, 2020 – Garland Technology, a… The post Bricata and Garland Technology Announce…

The HttpOnly Flag – Protecting Cookies against XSS

Read the original article: The HttpOnly Flag – Protecting Cookies against XSS Cross-site scripting (XSS) attacks are often aimed at stealing session cookies. In such an attack, the cookie value is accessed by a client-side script using JavaScript (document.cookie). However,…

SMEs Especially Vulnerable to Pandemic Security Challenges

Read the original article: SMEs Especially Vulnerable to Pandemic Security Challenges Small- and medium-sized enterprises (SMEs) have always been in the spotlight when it comes to security risks and breaches, but the intensity is increasing exponentially during COVID-19. Right now,…

Is a Ransomware Attack a Reportable Data Breach?

Read the original article: Is a Ransomware Attack a Reportable Data Breach? One question that vexes security engineers, incident responders and lawyers is whether a ransomware attack constitutes a reportable data breach under any of the various data breach disclosure…

MDM Primer: How to Compare & Select an MDM

Read the original article: MDM Primer: How to Compare & Select an MDM Compare and choose the right MDM for your remote device security and management with this MDM 101 primer. Try JumpCloud Free today. The post MDM Primer: How…

XKCD ‘Rabbit Introduction’

Read the original article: XKCD ‘Rabbit Introduction’ via the comic delivery system monikered Randall Munroe resident at XKCD! Permalink The post XKCD ‘Rabbit Introduction’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the original article: XKCD…

How to cyber security: Pain in the *AST

Read the original article: How to cyber security: Pain in the *AST What’s the difference between IT security and application security? And what do all those acronyms mean? Learn more in our quick cyber security primer. The post How to…

Daniel Stori’s ‘Back And Forth’

Read the original article: Daniel Stori’s ‘Back And Forth’ via the inimitable Daniel Stori at turnoff.us The post Daniel Stori’s ‘Back And Forth’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the original article: Daniel Stori’s…

Uber ex-CISO Charged ‘Obstruction and Misprision,’ say DoJ/FBI

Read the original article: Uber ex-CISO Charged ‘Obstruction and Misprision,’ say DoJ/FBI Joe Sullivan, Uber’s former security honcho, stands accused of obstructing justice and covering up a crime. The post Uber ex-CISO Charged ‘Obstruction and Misprision,’ say DoJ/FBI appeared first on…

Akamai Identifies Copycat DDoS Extortion Rings

Read the original article: Akamai Identifies Copycat DDoS Extortion Rings A group of copycat cybercriminals that appear to be pretending to be affiliated with more notorious threat actors are sending extortion letters threatening distributed denial of service (DDoS) attacks. According…

Nebulous Security Visibility Needs 3 Vantage Points

Read the original article: Nebulous Security Visibility Needs 3 Vantage Points Most of cybersecurity is based on having visibility of security events and providing protection ranging from preventing the action from being executed as it is being found to alerting…

Browser Extensions, an Overlooked Phishing Attack Vector

Read the original article: Browser Extensions, an Overlooked Phishing Attack Vector As users continue to leverage browser extensions to save time and increase productivity it is attracting the attention of cybercriminals. Learn how malicious extensions are making their way into…

Bugcrowd Launches M&A Security Assessment Service

Read the original article: Bugcrowd Launches M&A Security Assessment Service Bugcrowd, a provider of crowdsourced security services, this week launched an offering designed for organizations that need to assess the cybersecurity resiliency of a potential acquisition. Company CEO Ashish Gupta…

XKCD ‘Boat Puzzle’

Read the original article: XKCD ‘Boat Puzzle’ via the comic delivery system monikered Randall Munroe resident at XKCD! Permalink The post XKCD ‘Boat Puzzle’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the original article: XKCD…

4 Google Classroom Security Issues

Read the original article: 4 Google Classroom Security Issues District IT teams need to be aware of potential Google Classroom security issues as we enter into the new school year Google was already the main player in K-12 school districts.…

The Changing Face of Loyalty Programs Amid and Post-COVID-19

Read the original article: The Changing Face of Loyalty Programs Amid and Post-COVID-19 COVID-19 has undoubtedly prompted the Hospitality and Travel industry into a new era of customer loyalty. Currently, "shelter in place" or similar nonessential travel bans are instituted…

All About the CISSP

Read the original article: All About the CISSP What is it? The CISSP or Certified Information System Security Professional is a certification created by (ISC)² (International Information Systems Security Consortium). (ISC)² is a cybersecurity professional organization that specializes in educating…