What is Unified Endpoint Management? The digital landscape is evolving at an unprecedented pace, and with it, the significance of Unified Endpoint Management (UEM) has never been more paramount. What is Unified Endpoint Management? UEM offers a holistic approach to…
Category: Security Boulevard
Randall Munroe’s XKCD ‘DateTime’
<a class=” sqs-block-image-link ” href=”https://xkcd.com/2867/”> <img alt=”” height=”478″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/be43a4da-969d-4d0f-a668-f344f778c681/datetime.png?format=1000w” width=”679″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘DateTime’ appeared first on Security Boulevard. This article…
Below the Surface Winter 2023
East vs. West – The Chip Wars are in Full Effect Welcome to the Winter 2023 edition of the Below the Surface Threat Report. Every nation state has long realized that whichever nations win the race to quantum computing and…
Microsoft Targets Threat Group Behind Fake Accounts
Microsoft seized parts of the infrastructure of a prolific Vietnam-based threat group that the IT giant said was responsible for creating as many as 750 million fraudulent Microsoft accounts that were then sold to other bad actors and used to…
Emerging Technologies, Evolving Threats: Strategies for Future-Proofing Data Security
With AI’s ability to learn from data and continuously refine its tactics, cybercriminals can create more sophisticated, elusive and difficult-to-detect malware. The post Emerging Technologies, Evolving Threats: Strategies for Future-Proofing Data Security appeared first on Security Boulevard. This article has…
The U.S. Needs a Better AI Plan
To supercharge its technological capabilities, the US government is setting sail on a transformative AI journey. However, a recent Government Accountability Office (GAO) report reveals a critical lack of policies and standards, leaving the nation’s security vulnerable. The 96-page exposé…
CISA Cites Modest Progress in Reducing CVEs
CISA highlighted advancements related to two Cybersecurity Performance Goals (CPGs) it first introduced in October 2022. The post CISA Cites Modest Progress in Reducing CVEs appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
US Sanctions Sinbad Mixer: Disrupting Threats Unveiled
The U.S. Treasury Department recently took a significant step in the ongoing battle against cybercrime by imposing sanctions on Sinbad. It’s a virtual currency mixer utilized by the North Korea-linked Lazarus Group to launder funds obtained through various heists. This…
BTS #19 – A Year in Review on Offensive Security, Defensive Landscapes, and Global Implications – Tyler Robinson
In this episode, we delve into the dynamic world of supply chain security, recapping the significant developments of the past year. Join us as we explore the evolution of offensive security, defensive landscapes, and the key actors shaping the cybersecurity…
Our favorite recipes for the holiday season – Nudge Security
We’ve got cocktails, we’ve got elixirs, we’ve got sweets and sides. Here are a few of our favorite things to whip up for the holidays. The post Our favorite recipes for the holiday season – Nudge Security appeared first on…
NIST CSF Adoption and Automation
As a gold standard for cybersecurity in the United States and the foundation for many new standards and regulations starting to emerge today, the National Institute of Standards and Technology’s (NIST CSF) Cybersecurity Framework is more crucial than ever. Developed…
At a Glance: The Year in Cybersecurity 2023
In this post, we’ll take a look at some of the trends and news from 2023, and see what insights they could hold for the years ahead. The post At a Glance: The Year in Cybersecurity 2023 appeared first on…
Daniel Stori’s ‘Docker Panacea’
<a class=” sqs-block-image-link ” href=”https://turnoff.us/geek/docker-panacea/”> <img alt=”” height=”1009″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e5bc88dc-adbe-4618-8ad8-66425e0d54a2/panacea.png?format=1000w” width=”850″ /> </a><figcaption class=”image-caption-wrapper”> via the webcomic talent of the inimitable Daniel Stori at Turnoff.US. Permalink The post Daniel Stori’s ‘Docker Panacea’ appeared first on Security Boulevard. This article has been…
Taking a Proactive Approach to Mitigating Ransomware Part 2: Avoiding Vulnerabilities in SAP Applications
Taking a Proactive Approach to Mitigating Ransomware Part 2: Avoiding Vulnerabilities in SAP Applications ltabo Wed, 12/13/2023 – 17:25 In case you missed it, in the first part of this series we talked about the importance of hardening security for…
Russia Hacks Ukraine, Ukraine Hacks Russia — Day#658
When will it end? Russia takes down Kyivstar cellular system, Ukraine destroys Russian tax system. The post Russia Hacks Ukraine, Ukraine Hacks Russia — Day#658 appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
Stopping Lateral Movement Means Identifying the Small Hops That Take Attackers Far
Attackers are opting to use tools that allow them to make countless small hops designed specifically to avoid detection. The post Stopping Lateral Movement Means Identifying the Small Hops That Take Attackers Far appeared first on Security Boulevard. This article…
How Google is Using Clang Sanitizers to Make Android More Secure
Google is committed to making Android the most secure mobile operating system on the market. One of the ways they do this is by using Clang sanitizers to identify and fix vulnerabilities in the Android baseband. What are Clang sanitizers?…
Clang Sanitizers: Keeping Your Code Clean and Secure
Clang sanitizers are a powerful toolset for developers to improve the quality and security of their C and C++ code. Developed as part of the LLVM compiler infrastructure, they offer a variety of benefits, including: 1. Memory Error Detection: 2.…
FCC Warns Carriers to Protect Customers Against SIM Swaps
A month after issuing new rules to push back against SIM-swap and similar schemes, the Federal Communications Commission (FCC) is warning mobile phone service providers of their obligations to protect consumers against the growing threat. The FCC’s Enforcement Bureau will…
Inside the Challenges of XDR Implementation and How to Overcome Them
While XDR tackles the enterprise security challenge of threat detection across a diverse attack surface, it can also create new issues. The post Inside the Challenges of XDR Implementation and How to Overcome Them appeared first on Security Boulevard. This…