RAD Security CEO Brooke Motta dives into the unique cybersecurity requirements of cloud computing environments in the wake of the company picking up an additional $14 million in funding. Brooke covers the broader industry trend toward platform-based security solutions and…
Category: Security Boulevard
The cybersecurity ‘fog of war’: How to apply data science to cut through
One of the biggest problems cybersecurity teams face is the overwhelming uncertainty of situations as cyberattacks unfold. It’s hard to know what mitigations to work on first, which systems are most likely to risk business loss as threat rapidly moves…
The Fallacy of Arbitrary Severity Scales
Let’s assign severity where it belongs, not based on arbitrary scales but on a foundation of proof and context. Only then can we navigate the complexities of modern cybersecurity with confidence and precision. The post The Fallacy of Arbitrary Severity…
Hackers Made $600,000 Selling Stolen Taylor Swift Concert Tickets
Employees of a third-party company hacked into StubHub’s computer system, stole almost 1,000 digital tickets to Taylor Swift concerts and other events, and emailed them to conspirators in New York, who then sold them on StubHub in a scheme that…
Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust
S04 EP 03: Dave and Dr. Zero Trust weigh the difference between delivering refined news and raw perspective, hitting critical mass for AI, and the current political environment. The post Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero…
OpenText Adds AI Threat Detection Module to Platform
OpenText added a threat detection module to its core platform that makes use of artificial intelligence to more accurately surface anomalies. The post OpenText Adds AI Threat Detection Module to Platform appeared first on Security Boulevard. This article has been…
AI, Web Scraping and the Transformation of Data Privacy: What the EDPB’s Rulings Mean for Businesses
Web scraping is no longer just about collecting raw data. AI transforms this data, embedding it into machine learning models that can generate insights, predict behaviors and even infer new information about individuals in ways that were never intended when…
BreachRx Brings Generative AI to Security Incident Management
BreachRx this week added generative artificial intelligence (GenAI) capabilities to a security incident platform that promises to streamline workflows across all the stakeholders that need to collaborate. The post BreachRx Brings Generative AI to Security Incident Management appeared first on…
What are the latest trends in NHI protection for CIOs?
Are CIOs Prepared for the Rising NHI Trends? When the cloud environment evolves to deliver seamless business solutions, it brings along unique challenges in terms of data security. Needless to say, managing Non-Human Identities (NHIs) has become a primary concern…
What are the risks of unmanaged NHIs in enterprise environments?
Are Unmanaged Non-Human Identities (NHIs) Jeopardizing Your Enterprise Environment? With cloud-native applications, AI technologies, and IoT devices permeating modern enterprises, Non-Human Identities (NHIs) have become critical components. But what happens when these NHIs are left unmanaged? Do you comprehend the…
How can executive teams ensure NHI compliance with industry standards?
Why is Compliance Crucial for Non-Human Identities? Executive teams often face an array of complex challenges. One such challenge concerns Non-Human Identities (NHIs) compliance. So, why is it essential to get this right? Non-Human Identities are machine identities used in…
How Unified SSO reduces complexity and enhances security
Large enterprises operate complex IT environments, balancing legacy on-premises applications with modern cloud services. Over time, they have accumulated multiple identity providers (IDPs) like Microsoft Entra ID, Okta, and Ping Identity to manage authentication across different business units and applications.…
Ransomware Attack Ends a 150 Year Company
Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cybersecurity matters to every company that depends on digital technology – even if it is…
DEF CON 32 – War Stories – Stranger In A Changed Land
Author/Presenter: Tony Sage Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The…
7 container security best practices
Properly securing containers has never been easy, but the rise of software supply chain attacks — and new threats coming from AI — makes additional security controls essential. Threats and risks must be identified and addressed before containers are deployed,…
Apple vs. UK — ADP E2EE Back Door Faceoff
Won’t Tim Think of the Children? End-to-end encryption battle continues. The post Apple vs. UK — ADP E2EE Back Door Faceoff appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Apple vs.…
DEF CON 32 – War Stories – Breaking Network Crypto In Popular Chinese Keyboard Apps
Author/Presenter: Jeffrey Knockel, Mona Wang Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.…
Cybereason CEO Resigns Amid Funding Dispute with Investors
Eric Gan, who last month filed a lawsuit against top Cybereason investors for rejecting multiple financing plans, reportedly resigned as the company’s CEO after months of turmoil within the cybersecurity company’s boardroom. The post Cybereason CEO Resigns Amid Funding Dispute…
Eleven11bot Captures 86,000 IoT Devices for DDoS Attacks
The massive Eleven11bot has compromised more than 86,000 IoT devices, including security cameras and network video recorders, to launch hundreds of DDoS attacks, and security researchers say the threat actors behind the botnet are trying to grow it even more.…
What is the Process of ISO 27001 Certification?
In 2025, the cost of cyberattacks will reach $10.5 trillion globally. The projected growth rate is 15% every year. While the cost of attack keeps increasing, a breach is now identified in 194 days on average. It takes 64 days…