Category: Security Boulevard

TrustCloud Product Updates: April 2024

See what’s new in TrustCloud You know us: Every month we’re cooking up something new! Here are the updates that hit TrustCloud this month. TrustShare GraphAI will answer questionnaires for you with accurate, high-quality responses. TrustShare is getting a huge…

Randall Munroe’s XKCD ‘Doppler Effect’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2926/” rel=”noopener” target=”_blank”> <img alt=”” height=”317″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/14e051b5-7301-4905-a362-e47a39123c36/doppler_effect.png?format=1000w” width=”671″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Doppler Effect’ appeared first on Security…

Unlocking the Prioritization Secrets of Top CISOs

In the chaotic and ever-changing world of cybersecurity, the line between a good Chief Information Security Officer (CISO) and a top-tier one often boils down to one crucial skill: ruthless prioritization. But how do these elite CISOs navigate the complex…

Brits Ban Default Passwords — and More IoT Stupidity

Nice Cup of IoTea? The UK’s Product Security and Tele­comm­uni­cations Infra­struc­ture Act aims to improve the security of net-connected consumer gear. The post Brits Ban Default Passwords — and More IoT Stupidity appeared first on Security Boulevard. This article has…

Introducing the Unified RL Spectra Suite

One thing you quickly realize in cybersecurity is that change is a constant. Cyber criminals, nation-state hacking crews, and ideologically motivated hackers are always on the lookout for new technologies, tools, and tactics that give them an edge against defenders.…

Sysdig Extends CNAPP Reach to AI Workloads

The goal is to enable cybersecurity and data science teams to work together and share their expertise. The post Sysdig Extends CNAPP Reach to AI Workloads appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

SSH vs. SSL/TLS: What’s The Difference?

SSH and SSL/TLS are two widely used cryptographic protocols for establishing secure connections and ensuring secure communication between two parties over an unsecured network. While both protocols offer the same benefits—authentication, encryption, and data integrity—they are designed for different use…

LockBit, RAGroup Drive Ransomware Attacks in March

Global ransomware attacks rose slightly in March compared to the previous month, as ransomware cabal RAGroup ramped up activity by more than 300%. However, overall activity declined 8% year-over-year, according to NCC Group’s latest ransomware report. The cyber gang LockBit…

MITRE ATT&CK v15: A Deeper Dive into SaaS Identity Compromise

The MITRE ATT&CK framework is a continually evolving resource, tracking the tactics, techniques, and procedures (TTPs) employed by adversaries across all phases of an attack. The recent v15 release brings valuable updates and Obsidian Security is honored to have contributed…

External Penetration Testing: Cost, Tools, Steps, & Checklist

External penetration testing is a critical cybersecurity practice that helps organisations defend their internet-facing assets. By simulating the actions of a real-world attacker, external penetration tests reveal vulnerabilities in your web applications, networks, and other externally accessible systems. This post…