GDPR violations can result in severe consequences. In its first year, over 89,000 data breaches were reported, leading to fines totaling €56 million. In 2019, the UK’s Information Commissioner’s Office (ICO) imposed record fines on British Airways (€183 million) and…
Category: Security Boulevard
Eclypsium Product Roadmap
Join Eclypsium Product Manager, Joe Hopp, for an overview of new product updates and a preview of the features and solutions on the Eclypsium Supply Chain Security Platform roadmap. The post Eclypsium Product Roadmap appeared first on Eclypsium | Supply…
Why Investing in Quality Analysts is Investing in Your Future
In a rapidly evolving marketplace, the quality of your products and services directly impacts your company’s longevity and success. By investing in the services of…Read More The post Why Investing in Quality Analysts is Investing in Your Future appeared first…
Randall Munroe’s XKCD ‘Slingshots’
<a class=” sqs-block-image-link ” href=”https://xkcd.com/2981/” rel=”noopener” target=”_blank”> <img alt=”” height=”420″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/569a573c-5093-4fc6-8070-0a82a0cdea73/slingshots.png?format=1000w” width=”397″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Slingshots’ appeared first on Security Boulevard. This…
FIPPA: Understanding Canada’s Information and Protection Privacy Law
In today’s data-driven world, protecting personal information and the right to access government records are fundamental to ensuring transparency and privacy. Canada’s Freedom of Information and Protection of Privacy Act (FIPPA) is a key piece of legislation that balances these…
USENIX Security ’23 – BunnyHop: Exploiting the Instruction Prefetcher
Authors/Presenters:Zhiyuan Zhang, Mingtian Tao, Sioli O’Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at…
Empowering Cybersecurity on the Go: Nuspire’s Revolutionary Mobile App
In a world where cybersecurity threats don’t keep to office hours, having a mobile app cybersecurity solution that allows you to respond swiftly and effectively is crucial. Imagine you’re at an offsite meeting or traveling between locations when a critical…
Achieving Cyber Clarity: myNuspire for Unified Cybersecurity Management
To stay ahead of cyber threats, organizations need a dynamic and unified approach to managing their security landscape. That’s where Nuspire’s myNuspire platform steps in, serving as a cornerstone of our managed security services. It combines human expertise, advanced AI…
Meet Nutron: Your AI-Driven Ally in Proactive Cyber Defense
Imagine you’re part of a cybersecurity team that just received an alert about a potential breach. The clock is ticking, and your team is flooded with data and alerts from multiple sources. Sorting through this overwhelming volume of information to…
Redefining Cyber Defense: Introducing the Nuspire Cybersecurity Experience
In an era where digital threats evolve at breakneck speed, organizations need an integrated cybersecurity solution to stay ahead. The cybersecurity landscape has become increasingly complex, with attackers employing sophisticated techniques that can easily overwhelm traditional security measures. Enter Nuspire,…
Introducing the Nuspire Cybersecurity Experience: A New Era of Intelligent Unification
A New Chapter in Cybersecurity As the CEO of Nuspire, I’m thrilled to announce a groundbreaking evolution in our cybersecurity offerings. Today, we’re launching the Nuspire Cybersecurity Experience – a comprehensive solution designed to address the most pressing challenges in…
The Weaponization of AI and ML is Complicating the Digital Battlefield
Zero-trust architecture is increasingly seen as a solution to the challenges posed by AI and ML. Initial training must focus on standardizing basic technologies. The post The Weaponization of AI and ML is Complicating the Digital Battlefield appeared first on…
Old Habits, New Threats: Why More Phishing Attacks are Bypassing Outdated Perimeter Detection
The rise in sophisticated phishing threats like polymorphic attacks, social engineering tactics, and the use of compromised accounts have undoubtedly highlighted the significant gaps in perimeter technology, leading to a notable increase in bypassed attacks. The post Old Habits, New…
The Foundation of Zero-Trust Security Architecture
For today’s IT organizations, establishing a zero-trust (ZT) architecture is an ongoing process of refinements for existing networks, resources, methods and security capabilities. The post The Foundation of Zero-Trust Security Architecture appeared first on Security Boulevard. This article has been…
Security Budget Growth Slows, but Spending Remains Elevated
The expansion of security budgets has slowed, indicating the end of rapid growth in the sector, according to a survey of 755 CISOs. The post Security Budget Growth Slows, but Spending Remains Elevated appeared first on Security Boulevard. This article…
USENIX Security ’23 – Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Authors/Presenters:Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the…
USENIX Security ’23 – (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels
Authors/Presenters:Ruiyi Zhang, Taehyun Kim, Daniel Weber, Michael Schwarz Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and…
Protecting NATO Secret and Foreign Government Information
We’ve talked a lot on this blog about protecting controlled unclassified information, and we’ve mentioned in places some other kinds of information, like classified and secret information, covered defense information, and other protected information. There’s one thing all of this…
Talking DSPM: Episode 4 – Dr. Mohit Tiwari
I’m Mohit Tiwari. I’m one of the co-founders of Symmetry Systems, and the CEO. Symmetry was spun out of Spark… The post Talking DSPM: Episode 4 – Dr. Mohit Tiwari appeared first on Symmetry Systems. The post Talking DSPM: Episode…
Cyber Insurers Are Not Your Friend – Why a Warranty May Be a Better Option
Gary Perkins, Chief Information Security Officer In this landscape, organizations need a multi-faceted approach that includes prevention, detection, and response capabilities. A warranty tied to a comprehensive security solution supports this approach, providing both technological protection and financial assurance. The…