Category: Security Boulevard

Get an Untrusted Security Advisor! Have Fun, Reduce Fail!

Many organizations are looking for trusted advisors, and this applies to our beloved domain of cyber/information security. If you look at LinkedIn, many consultants present themselves as trusted advisors to CISOs or their teams. Untrusted Advisor by Dall-E via Copilot This perhaps…

AI-Generated Personas: Trust and Deception

And the Ethical Dilemma of Using AI to Create Fake Online Personalities In recent years, advancements in artificial intelligence (AI) have given rise to powerful tools like StyleGAN and sophisticated language models such as ChatGPT. These technologies can create hyper-realistic…

CISOs Concerned Over Growing Demands of Role

There are growing concerns among chief information security officers (CISOs) about the evolving demands of their role, with 84% advocating for a split into separate technical and business-focused positions. The Trellix and Vanson Bourne survey of 5,000 CISOs and IT…

How to Master CentOS Commands: The Ultimate Cheat Sheet

Mastering CentOS commands can help you effectively manage CentOS systems, perform common tasks, and troubleshoot issues. Process management is streamlined using commands like ps and top, which help monitor and troubleshoot system performance in real time. Each command is described…

Understanding the Importance of MFA: A Comprehensive Guide

Protecting digital identities is essential for individuals and organizations in a world where cyberattacks are becoming more sophisticated and frequent. If anything has proven to boost security massively, it has to be the proper utilization of Multi-Factor Authentication (MFA). While…

Email Aliasing is a Great Privacy Tool

Using the same email address everywhere isn’t helping you be more private. But short of creating a multiple new mailboxes and subsequently managing them – what can you do? TABLE OF CONTENTS The problem What is email aliasing? Plus addressing…

The CMMC Final Rule is Published: What Contractors Need to Know

The Department of Defense (DoD) published the Cybersecurity Maturity Model Certification (CMMC) Final Rule on October 15, 2024. This newly issued regulation (CFR 32) can be viewed in the Federal Register and will go into effect on December 16, 2024. It introduces key changes for organizations…

Linux Persistence Mechanisms and How to Find Them

Linux persistence mechanisms are used by an attacker to maintain access to a compromised system, even after reboots or system updates. These allow attackers to regain control of a system without re-exploiting initial vulnerabilities. Persistence methods can vary in sophistication,…

Ransomware Payouts Decline as Security Maturity Rises

There has been a sharp decline in ransomware payouts, with only 11% of companies admitting to paying demands, which has been attributed to increased investment in backup and recovery technologies. The post Ransomware Payouts Decline as Security Maturity Rises appeared…