According to recent studies, over 80% of data breaches are attributed to compromised credentials, highlighting the critical need for robust identity threat detection solutions. The post MixModes Approach to Combating The Growing Threat of Identity-Based Attacks on Enterprise Organizations appeared…
Category: Security Boulevard
CISA to Developers: Adopt Memory Safe Programming Languages
Software makers need to embrace the growing number of newer programming languages that protect memory to reduce the number of security vulnerabilities in their products, according to cybersecurity agencies in the United States and other countries. The U.S. Cybersecurity and…
Lessons Learned: Five Cybersecurity Takeaways from 2023
After another (nearly) action-packed 12 months it’s time to take stock. There have been breaches galore, new cybersecurity mandates and regulations, fascinating data points and the emergence of some industry trends which will shape the future of IT. Here’s our…
Dragos Offers Free OT Security Tools to Small Utilities
Cybersecurity vendor Dragos will provide free operational technology (OT) security software to small water, electric, and natural gas providers, an offer that comes as critical infrastructure comes under increasing attack. The program initially will be available in the United States…
Concerned About Business Email Compromise? 4 Technologies That Can Help
Understanding the scope and impact of BEC is critical for any business that wants to protect itself from this insidious threat. The post Concerned About Business Email Compromise? 4 Technologies That Can Help appeared first on Security Boulevard. This article…
Developers behaving badly: Why holistic AppSec is key
A recent survey shows that untested software releases, rampant pushing of unvetted and uncontrolled AI-derived code, and bad developer security are all culminating to seriously expand security risks across software development. Add in the explosion of low-code/no-code development and economic…
In Pursuit of a Passwordless Future
The passwordless future feels close because we have the technology to do it, but progress will be slow as applications are migrated to adopt passwordless authentication. The post In Pursuit of a Passwordless Future appeared first on Security Boulevard. This…
PCI 4.0: Your Next Audit May Take Longer, But it’s for a Good Cause
By: Brian Dean, Senior Security Consultant, QSA Change is in the Air 2024 is almost here, and that means PCI DSS 4.0 will soon go into effect. The newest version will have some mandatory controls on March 31, 2024, for…
Top Security Trends and Predictions for 2024
Approov stands at the forefront of mobile cybersecurity: Our expansive customer base, ongoing research initiatives and the insights we collect from our live threat metrics, give us unique visibility into trends in mobile security. Based on this data, we wanted…
The Imperative for Zero Trust in a Cloud-Native Environment
What is Zero Trust Security? Zero-trust security is not a specific technology or product, but a security model based on the concept that “All entities are untrusted”. Forrester defines zero trust as “Zero Trust is an information security model that…
Randall Munroe’s XKCD ‘Space Typography’
<a class=” sqs-block-image-link ” href=”https://xkcd.com/2863/”> <img alt=”” height=”239″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/68183986-2e78-4455-a2ec-959a0d4b1fe1/space_typography.png?format=1000w” width=”740″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD! Permalink The post Randall Munroe’s XKCD ‘Space Typography’ appeared first on Security Boulevard. This…
Taking a Proactive Approach to Mitigating Ransomware Part 1: You Can’t Neglect the Application Layer
Taking a Proactive Approach to Mitigating Ransomware Part 1: You Can’t Neglect the Application Layer ltabo Wed, 12/06/2023 – 18:42 < div class=”field field–name-body field–type-text-with-summary field–label-hidden field__item”> Ransomware continues to dominate cybersecurity news. The proliferation of attacks – 66% of…
BlackCloak’s Approach to Executive Cyber Health: Understanding, Measuring, and Securing
The personal digital well-being of executives is increasingly under threat. BlackCloak understands this evolving landscape and has developed a comprehensive approach to safeguard executives. Let’s discuss how BlackCloak collaborates with security leadership to understand their concerns, measures executive cyber risk…
DEF CON 31 – Joe Slowik’s ‘Contextualizing The Vulkan Leaks & State Sponsored Offensive Ops’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
CISA: Hackers Use ColdFusion Flaw to Breach Federal Agency
A security flaw in Adobe’s ColdFusion application development tool that was patched in March continues to be a headache for organizations running unpatched versions of the product. This week, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said two public-facing…
Use Windows 10? You Must PAY for Security
Micro$oft Window$ E$U: From October 2025, Microsoft will start charging for security updates to Windows 10. The post Use Windows 10? You Must PAY for Security appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…
5 Security Benefits of Application Mapping
Application mapping can have many advantages for organizations managing complex IT infrastructure, not the least of which is security. The post 5 Security Benefits of Application Mapping appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Russian-Backed Hackers Target High-Value US, European Entities
Hackers linked to Russia’s military intelligence unit exploited previously patched Microsoft vulnerabilities in a massive phishing campaign against U.S. and European organizations in such vectors as government, aerospace, and finance across North America and Europe. The advanced persistent threat (APT)…
Understanding Each Link of the Cyberattack Impact Chain
A cyberattack’s impact chain starts with the initial breach and frequently has no clear endpoint. But it’s important to understand every ‘link’ to mitigate the damage. The post Understanding Each Link of the Cyberattack Impact Chain appeared first on Security…
Survey Surfaces Wasted Efforts Collecting Cybersecurity Data
Security teams are wasting time and resources normalizing data to store and analyze it in a separate platform instead of relying on the same data IT teams use to manage operations. The post Survey Surfaces Wasted Efforts Collecting Cybersecurity Data…