Category: Security Boulevard

Accelerating FedRAMP ATOs: OMB Memo

The Office of Management and Budget (OMB) released a Draft Memorandum for Modernizing the Federal Risk and Authorization Management Program (FedRAMP) on Friday, Oct 27, 2023. FedRAMP was codified in 2022 when Congress passed the FedRAMP Authorization Act (“Act”).  The…

How to Get HITRUST Certified—and Why

What is the HITRUST Certification? In 2007, a group of healthcare organizations, technology companies, and government agencies—including the American Hospital Association, Blue Cross Blue Shield Association, the Centers for Medicare & Medicaid Services (CMS), McKesson Corporation, and Microsoft—got together to…

Identity Theft: The Silent Threat for Executives

Identity theft isn’t a new phenomenon, but its rise in the executive world can no longer be ignored. As a CISO, you understand the importance of safeguarding not only your organization’s data but also the personal information of your top-level…

8 Essential Windows Security Tips to Protect Your Computer

Windows operating systems and software are complex pieces of software with millions of lines of code. This means that there are many potential vulnerabilities, or flaws, that can be exploited by attackers. Attackers can use vulnerabilities to gain unauthorized access…

Achieving Zero-Standing Privileges with Okta and Apono

Organizations are twice as likely to get breached through compromised credentials than any other threat vector. Compromised credentials are when credentials, such as usernames and passwords, are exposed to unauthorized entities.  When lost, stolen or exposed, compromised credentials can give…

DEF CON 31 – Policy Panel: International Cyber Policy 101

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…

SOC Automation Explained: 7 Real-World Examples

The Security Operations Center (SOC) serves as a hub for an organization’s cybersecurity efforts. It is tasked with the responsibility of defending against unauthorized activities in the digital landscape. A SOC specializes in activities including monitoring, detection, analysis, response, and…

Why Smart SOAR is the Best SOAR for Slack

Effective communication is a critical component in incident response, often making the difference between rapid resolution and prolonged impact. This article explores how the integration between Smart SOAR and Slack provides a focused set of automated tasks to improve communication…

Staying Ahead of Social Engineering Threats

With social engineering exploits on the rise, now is a good time to stay ahead of threats and attackers’ tricks, keep your personal and sensitive data safe and stop unlawful entry into your organization. Bad actors are always looking for…

IT, Security Leaders Play Catch-Up With Generative AI Threats

There’s a significant disparity between organizations’ concerns about generative AI risks and their effectiveness in addressing them. The post IT, Security Leaders Play Catch-Up With Generative AI Threats appeared first on Security Boulevard. This article has been indexed from Security…