Category: Security Boulevard

Strengthening Access Control Testing

Strengthening Access Control Testing: The Key Questions You Need to AskMake no mistake: businesses are under attack. There is an increasing gap between objectives and execution when it comes to securing our organizations, and access governance along with effective access…

Reimagining Risk Assessment: Insights from the SEC

Reimagining Risk Assessment: Insights from SEC’s Chief Accountant SEC’s Chief Accountant, Paul Munter, recently offered insights on how companies should reimagine risk assessment. In his address, ‘The Importance of a Comprehensive Risk Assessment by Auditors and Management,’ he highlights a concerning…

What is GDPR Compliance and its 7 principles?

In the quick-paced digital world, personal data is extremely valuable. This makes privacy protection essential. With 67% of EU residents aware of it, the GDPR  is thought to be the strictest data privacy law in the world.   In the year…

Key Take Aways from NIST Releases 800-171 Revision 3

On November 9th 2023 National Institute of Standards and Technology, NIST, released special publication 800-171 Revision 3 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations as a Final Public Draft. Both the full draft and accompanying assessment methodology were…

FBI’s Warrantless Spying on US Must Continue, Says FBI

Privacy, schmivacy: FBI head Christopher Wray (pictured) doesn’t see what all the fuss is about. Just renew FISA section 702 already! The post FBI’s Warrantless Spying on US Must Continue, Says FBI appeared first on Security Boulevard. This article has…

The ABCs of API Security: A New (Free!) Learning Center

APIs have been with us since before they were called APIs. Application programming interfaces as an interface between software or between users and software have been around since the 1940’s, around 20 years before such interfaces were called APIs. In…

MOVEit Hack: What went wrong, and how to course correct

What the MOVEit Breach Tells Us About the Challenges of Patching On May 31, 2023, little-known software developer Progress Software published details of a critical vulnerability in MOVEit Transfer, a popular managed file transfer service. It soon transpired that notorious…

PCI Compliance Made Easy: 5 Technologies That Can Help

These five technologies can help secure data, minimize risks and bolster an organization’s defenses to ease PCI DSS compliance efforts. The post PCI Compliance Made Easy: 5 Technologies That Can Help appeared first on Security Boulevard. This article has been…

Making Proxy Security a Priority For a Safer Future

The proxy industry plays a crucial role in today’s internet ecosystem, providing anonymity and security for users and businesses who want to conduct market research, travel fare aggregation, ad verification or monitor price changes and possible threats online. However, the…

Google And Yahoo New Email Authentication Requirements

Google and Yahoo have recently announced new requirements … The post Google And Yahoo New Email Authentication Requirements appeared first on EasyDMARC. The post Google And Yahoo New Email Authentication Requirements appeared first on Security Boulevard. This article has been…

AZT: The Market For Enterprise (Secure) Browsers

Listen now (46 mins) | Season two, episode 18: Evgeniy Kharam, a founder, CISO, architect, and podcast producer discusses the rise of Enterprise (Secure) browsers. The post AZT: The Market For Enterprise (Secure) Browsers appeared first on Security Boulevard. This…

34 WDM And WDF Models Vulnerable: Protect Your Devices

In a significant revelation, security experts have uncovered a substantial number of Windows Driver Model (WDM) and Windows Driver Frameworks (WDF) drivers with potential vulnerabilities that could be exploited by malicious actors. These drivers, if compromised, could enable attackers without…