Category: Security Boulevard

2023 Cyber Review: The Year GenAI Stole the Show

This was a year unlike any other in the brief history of the cybersecurity industry, with generative artificial intelligence disrupting plans and ushering in unparalleled change to security. The post 2023 Cyber Review: The Year GenAI Stole the Show appeared…

The SOC 2 Compliance Checklist for 2023

SOC 2 is the gold standard in Information Security certifications and shows the world just how seriously your company takes Information Security. An incredible way to systematically evaluate and improve your company’s handling of customer data throughout its lifecycle, the…

WTH is Modern SOC, Part 1

In recent weeks, coincidentally, I’ve had several conversations that reminded me about the confusion related to “modern SOC.” Some of them were public (example and example), while others private. One particular person went on a quest through several “leading” companies’…

The Endless Pursuit of the Ecosystem

It isn’t possible to fully understand the cybersecurity ecosystem, but it’s the only motivation you need to keep trying. The post The Endless Pursuit of the Ecosystem appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Fighting the Next Generation of Fraud

The introduction of generative AI has been a game changer for fraudsters, transforming ordinary schemes into highly sophisticated efforts. The post Fighting the Next Generation of Fraud appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Identity Fraud Rises as E-Commerce, Payment Firms Targeted

Fraud incidents are on the rise, largely attributed to the surge in impersonation fraud and the accessibility of sophisticated attack methods and tools. The post Identity Fraud Rises as E-Commerce, Payment Firms Targeted appeared first on Security Boulevard. This article…

Welltok Data Breach: 8.5M US Patients’ Information Exposed

In a recent cybersecurity incident, Welltok, a leading healthcare Software as a Service (SaaS) provider, reported unauthorized access to its MOVEit Transfer server, affecting the personal information of approximately 8.5 million patients in the United States. Discovered on July 26,…

How Data Ingestion Works in SOAR

SOAR tools work as consolidation platforms for security alerts and incident response. Endpoint security tools, network security tools, email systems, and other tools collect logs, run detection rules and generate alerts. SOAR then ingests those alerts so teams can work…