What really is cyber security and why doesn’t the traditional CIA triad of confidentiality, integrity, and availability work? And what’s that got to do with footballs anyway? I’ve written this simple breakdown of the five key cyber security terms –…
Category: Security Boulevard
What is General Data Protection Regulation Act (GDPR)?
The widespread adoption of cloud services has introduced cybersecurity challenges and compliance complexities due to various privacy regulations in different jurisdictions. According to Pew Research Center, 79% of respondents expressed concerns about the collection and processing of their personal data…
Cloud Monitor Automation Improves K-12 Cybersecurity Training & Awareness
Last week, we hosted Michael Tapia, Chief Technology Director at Clint ISD in Texas, and Kobe Brummet, Cybersecurity Technician at Hawkins School District in Tennessee, for a live webinar. Michael and Kobe volunteered to share with other K-12…
USENIX Security ’23 – UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware
Authors/Presenters: Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from…
USENIX Security ’23 – Union Under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain
Authors/Presenters: Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the…
Bridging the Gap: Uniting Development and AppSec
We recently hosted a webinar on integrating development and security functions to increase organizational resilience. Industry leaders from Repsol, SAP, Payhawk, Rakutan, Vodafone, and IQUW discussed how aligning these crucial areas enhances efficiency. Of course this isn’t a new topic…
Understanding Cybersecurity Vulnerabilities
What is a cybersecurity vulnerability, how do they happen, and what can organizations do to avoid falling victim? Among the many cybersecurity pitfalls, snares, snags, and hazards, cybersecurity vulnerabilities and the likes of zero-day attacks are perhaps the most insidious.…
Cybersecurity Insights with Contrast CISO David Lindner | 4/26/24
Insight #1 AI is clearly becoming a problem, with headlines capturing incidents such as a deepfake audio impersonating a Chief Information Security Officer (CISO) and explicit deepfake photographs of high-school students being passed around in a Nevada, Iowa High School.…
Agile by Design: Cybersecurity at the Heart of Transformation
Unlock the dynamic interplay between cybersecurity and agility in today’s business landscape. Explore how organizations can fortify their defenses, foster innovation, and thrive amidst uncertainty. In an era defined by rapid technology advances, geopolitical complexities, and economic uncertainties, organizations face…
What is Network Pen Testing?
With cyber threats constantly evolving, protecting your network’s security is important. Network pen testing, also known as Network VAPT (Vulnerability Assessment and Penetration Testing), helps you attain this objective. It is a simulated cyber attack carried out by ethical hackers…
How to Migrate from FedRAMP Rev 4 to FedRAMP Rev 5
The stereotype of the government as a slow-moving behemoth is not ill-fitting, but when it makes adjustments and changes, it does so with deliberation and intent. An excellent example is the ongoing development and evolution of things like security standards.…
NodeZero: Testing for Exploitability of Palo Alto Networks CVE-2024-3400
On April 12 (and then updated again on April 20), Palo Alto Networks released an advisory about a vulnerability in the PAN-OS® software that runs Palo Alto Networks® Next-Generation Firewalls (NGFWs). The post NodeZero: Testing for Exploitability of Palo Alto…
North American Developers Optimistic About Generative AI and Code Security
North American software developers have reasonable confidence that generative AI can be a tool to improve the security of the software they’re building. In other regions? Not so much. The post North American Developers Optimistic About Generative AI and Code…
USENIX Security ’23 – LibScan: Towards More Precise Third-Party Library Identification for Android Applications
Authors/Presenters: *Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated…
AI Adoption Prompts Security Advisory from NSA
The warning underscores the importance of a collaborative approach to AI security involving stakeholders across different domains, including data science and infrastructure. The post AI Adoption Prompts Security Advisory from NSA appeared first on Security Boulevard. This article has been…
N.A. Developers Optimistic About Generative AI and Code Security
Developers in North America are more likely than their counterparts in other regions to see generative AI as a tool that can improve the security of the code they’re writing, according to a report by market research firm Evans Data…
The Role of Threat Intelligence in Financial Data Protection
As the financial industry increasingly adopts digital processes, it faces a growing array of cybersecurity threats. Cybercriminals target sensitive customer data held by retail banks and credit unions, exploiting vulnerabilities in digital systems to steal valuable information such as personally…
It’s All About Data: How to Drive Secure Use of AI
Although artificial intelligence (AI) has been with us for some time, the technology seems to be everywhere these days, as vendors and end users get more vocal about its benefits. They’re right to be enthused. McKinsey estimates that AI could…
Navigating the Evolving Threat Landscape: Addressing 2024 CISO and Security Team Goals with MixMode
As technology advances and attackers develop ever-more sophisticated tactics, CISOs and security teams face a constant battle of trying to stay ahead of the curve. This year, several key themes are expected to dominate the cybersecurity landscape, shaping the priorities…
How a YouTube Content Filter Can Give Your District More Control
You know YouTube, and you probably love YouTube. Beyond a place to share creative videos, it can be a great educational resource. However, it’s not all sunshine and rainbows. Although YouTube has fairly strict policies regarding the type of content…