Category: Security Boulevard

The 10 Women in Cybersecurity You Need to Follow

These women are innovating in the cybersecurity field. How many of them do you know? The post The 10 Women in Cybersecurity You Need to Follow appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

10 Essentials Every Anti-Phishing Course Must Have

In August 2023, Russian threat actors targeted several government agencies worldwide with Microsoft Teams phishing attacks. Many of these attacks were successful because unsuspecting users fell for the lures set by the attackers—emails purporting to be from trusted senders. Unfortunately,…

What is HSM Integration?

HSM Integration refers to the process of incorporating a Hardware Security Module (HSM) into an organization’s IT and security infrastructure. HSMs are physical devices designed to secure digital keys and perform cryptographic operations, such as encryption, decryption, and digital signing,…

What is Mobile Application Security Testing? Explained

Mobile application security testing is a critical aspect of modern software development, driven by the widespread use of mobile devices in our daily lives, which store vast amounts of personal data like photos, email access, social media accounts, and payment…

Baby ASO: A Minimal Viable Transformation for Your SOC

Vaguely relevant but very cyber image from Dall-E One pattern I spotted after looking at the evolution of IT and security organizations over the years, including my time at Gartner is: change is hard, but transformation is harder. Perhaps it is an…

USENIX Security ’23 – Inductive Graph Unlearning

Authors/Presenters: *Cheng-Long Wang, Mengdi Huai, Di Wang* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via…

The Dark Side of EDR: Repurpose EDR as an Offensive Tool

See how a SafeBreach Labs researcher bypassed the anti-tampering mechanism of a leading EDR to execute malicious code within one of the EDR’s own processes and altered the mechanism to gain unique, persistent, and fully undetectable capabilities. The post The…

Crunching Some Numbers on PHP Support

PHP Extended Lifecycle Support (ELS) allows you to continue using older versions of PHP while still receiving security updates for the language, without introducing breaking changes to your application. The first and obvious question might be, “Why would I want…

The Ultimate Guide to SBIR and STTR Program Budgeting

The world advances based on innovation, and innovation can come from anywhere. The trouble is that the current capitalist economic system encourages large corporations to play conservatively with their products and their budgets while working to secure their own positions…

Randall Munroe’s XKCD ‘Eclipse Path Maps’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2921/” rel=”noopener” target=”_blank”> <img alt=”” height=”674″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/b0b4c940-efc2-4c4f-bcf2-fa6a434060e6/eclipse_path_maps.png?format=1000w” width=”562″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Eclipse Path Maps’ appeared first on…