We’re at the end of Cybersecurity Awareness Month, which is a good time to reflect on where your organization needs to improve and extend it’s cybersecurity efforts. If you’re like most organizations the answer is IoT devices and applications; it’s…
Category: Security Boulevard
DEF CON 31 Policy – Panel: Blocking Pathways into Cybercrime Current Efforts, Future Opportunities
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
News alert: Ivanti reports reveals 49% of CXOs have requested bypassing security measures
Salt Lake City, Utah, Oct. 31, 2023 —Ivanti, the tech company that elevates and secures Everywhere Work, today announced the results of its Executive Security Spotlight report as part of Ivanti’s Cybersecurity Status Report Series. Ivanti surveyed over … (more…)…
News alert: Traceable celebrates winning the prestigious SINET16 Innovator Award for 2023
San Francisco, Calif., Oct. 31, 2023 – Traceable AI, the industry’s leading API security company, proudly announces its continued recognition in the cybersecurity industry, with the latest accolade being the prestigious SINET16 Innovator Award for 2023. The SINET16 Innovator … (more…) The…
How the SEC charges against SolarWinds highlight the cybersecurity liability of software companies
On October 30, 2023, the Securities and Exchange Commission (SEC) filed a civil complaint against SolarWinds Corporation and its chief information security officer, Timothy G. Brown, for violating federal securities laws by making false and misleading statements about its cybersecurity…
SolarWinds CISO Sued for Fraud by US SEC
The password was ‘solarwinds123’: SUNBURST still reverberates as SolarWinds CISO Timothy Brown co-defends SEC lawsuit. The post SolarWinds CISO Sued for Fraud by US SEC appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
CEO John Chen Exiting BlackBerry as It Prepares to Split
John Chen, who for a decade steered BlackBerry through its transformation from a mobile device maker to a provider of software for cybersecurity and the Internet of Things (IoT), will end his tenure this at the end of this week…
Advanced Behavioral Detection Analytics: Enhancing Threat Detection with AI
Gartner just released its Emerging Tech Impact Radar: Security, which looked at technologies that could help organizations effectively detect and respond to attacks and create better efficiencies through AI-based security hyper-automation. The post Advanced Behavioral Detection Analytics: Enhancing Threat Detection…
Protecting Against FraudGPT
FraudGPT is every CEO’s worst nightmare because it provides attackers with a ready-made tool to create highly realistic phishing scams. The post Protecting Against FraudGPT appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
Security Compliance for SaaS: Cutting Costs and Boosting Sales with Automation
Managing compliance manually can be a burdensome and never-ending task. However, there is a simpler solution: Automated Security Compliance. The post Security Compliance for SaaS: Cutting Costs and Boosting Sales with Automation appeared first on Scytale. The post Security Compliance…
LogRhythm Partners with D3 Security to Automate Threat Management and Incident Response Capabilities in Cloud-Native LogRhythm Axon SIEM
The combined solution empowers security teams to identify behavioral anomalies, internal and external threats, and to prioritize responses with accurate security intelligence BROOMFIELD, Colo., October 31, 2023–LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals……
Microsoft Data Leaks and the Importance of Open Source Intelligence
Open source intelligence (OSINT) helps organizations find both unintentional data leaks and criminal data breaches. The post Microsoft Data Leaks and the Importance of Open Source Intelligence appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Why Bad Bots Are the Digital Demons of the Internet
In the dimly lit corners of the internet, where shadows flicker and eerie silences prevail, there lurks entities of malevolent intent. They are not the stuff of old wives’ tales or campfire ghost stories. We’re talking about bad bots, the…
Cisco IOS XE CVE-2023-20198: Deep Dive and POC
Introduction This post is a follow up to https://www.horizon3.ai/cisco-ios-xe-cve-2023-20198-theory-crafting/. Previously, we explored the patch for CVE-2023-20273 and CVE-2023-20198 affecting Cisco IOS XE and identified some likely vectors an attacker might […] The post Cisco IOS XE CVE-2023-20198: Deep Dive and…
Agent vs. Agentless: A New Approach to Insider Risk Monitoring
A question our customers commonly ask is whether our InTERCEPT insider risk management platform is agent-based or agentless. The short answer is: “A bit of both, but better.” Technically speaking, InTERCEPT is an agent for the sheer fact that our…
What makes Web Applications Vulnerable?
Virtual programs are now an essential component of our daily lives. Web applications are now essential tools for both individuals and organizations. From online shopping to social media and banking, we depend on internet apps for convenience and accessibility. However,…
Simplify User Access with Federated Identity Management
Discover the power of federated identity management for seamless SSO and enhanced user access. Improve security and streamline authentication The post Simplify User Access with Federated Identity Management appeared first on Security Boulevard. This article has been indexed from Security…
What is a Cloud Workload Protection Platform ? (CWPP)
Diving into the Depths of Cloud Workload Defense Framework (CWDF) Mysteries Setting out to understand cloud security, one frequently encounters the term – Cloud Workload Defense Framework (CWDF). What exact role does CWDF play? Let’s decode this riddle. At its…
Author Q&A: Here’s why the good guys must continually test the limitations of ‘EDR’
A new tier of overlapping, interoperable, highly automated security platforms must, over the next decade, replace the legacy, on-premise systems that enterprises spent multiple kings’ fortunes building up over the past 25 years. Related: How ‘XDR’ defeats silos Now along…
Lateral Movement: Abuse the Power of DCOM Excel Application
In this post, we will talk about an interesting lateral movement technique called ActivateMicrosoftApp() method within the distributed component object model (DCOM) Excel application. This technique is built upon Matt Nelson’s initial research on “Lateral Movement using Excel.Application and DCOM”. What…