Category: Security Boulevard

Blocking in Production Requires a Modern Security DevEx | Impart Security

< div class=”blog-post4-content_component margin-top”> < div class=”blog-post4-content_content”> < div class=”text-rich-text w-richtext”> Blocking in Production Requires a Modern Security DevEx I’ve spoken to many security leaders who are genuinely scared of blocking in production. And I totally get it – blocking…

How to Strengthen and Improve Your Company’s Security Posture

Maintaining security posture is key to protecting organizations against cyberattacks. Here’s how to improve your security posture and keep your business safe.  The post How to Strengthen and Improve Your Company’s Security Posture appeared first on Security Boulevard. This article…

Tines Leverages LLMs to Simplify Security Automation

Tines today added an artificial intelligence (AI) chat interface to its no-code platform for automation cybersecurity workflows. The post Tines Leverages LLMs to Simplify Security Automation appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

US Elections: Iranian Hackers Target Political Campaigns

With elections, there have always been accusations of rigging and corruption and it’s possible that such claims may hold some truth in different countries worldwide. However, the US elections have recently been subjected to the influence of cybercrime. Such a…

Ubuntu 24.04.1 LTS Released: This is What’s New

Canonical’s Ubuntu 24.04 LTS, codenamed “Noble Numbat” has received its first major update: Ubuntu 24.04.1. This release, which arrived a bit later than initially planned due to some high-impact bugs, brings a host of improvements and enhancements to the popular…

BYOD Policies Fueling Security Risks

The use of employee mobile devices at work, or bring your own device (BYOD), is a significant and growing threat to organizational security. The post BYOD Policies Fueling Security Risks appeared first on Security Boulevard. This article has been indexed…

Vulnerability handling requirements for NIS2 compliance

In a previous blog post, we covered two foundational elements of the Network and Information Security (NIS2) Directive, software supply chain security and reporting requirements. In this blog, we take a closer look at the types of organizations impacted by…

ADCS Attack Paths in BloodHound — Part 3

ADCS Attack Paths in BloodHound — Part 3 In Part 1 of this series, we explained how we incorporated Active Directory Certificate Services (ADCS) objects into BloodHound and demonstrated how to effectively use BloodHound to identify attack paths, including the ESC1 domain escalation…

6 Questions to Answer Before Choosing an Identity Provider

Choosing the right identity provider is crucial, as it requires architectural changes that can make switching later difficult and costly. The post 6 Questions to Answer Before Choosing an Identity Provider appeared first on Security Boulevard. This article has been…