IronNet, the once high-flying network security vendor founded in 2014 by a former U.S. intelligence agency official, is shutting down operations after almost two years of financial struggles. The company, whose money problems began to emerge last year and which…
Category: Security Boulevard
Boards are Finally Taking Cybersecurity Seriously
It’s time to ensure boards’ interest in cybersecurity goes beyond just conversation and into real action. The post Boards are Finally Taking Cybersecurity Seriously appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…
NIST supply chain security guidance for CI/CD environments: What you need to know
The National Institute of Standards and Technology’s new proposed guidelines for integrating software supply chain security into CI/CD pipelines have arrived at an opportune time for security teams, with attacks on the software supply chain increasing in volume and sophistication.…
Survey Sees More Cyberattacks Targeting APIs
Despite increased vigilance, most organizations suffered an API security incident in the last 12 months. The post Survey Sees More Cyberattacks Targeting APIs appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…
Navigating the Nuances of the Asia-Pacific PDPA
Fundamental obligations of the Asia-Pacific Personal Data Protection Act (PDPA) for cybersecurity teams In the information age, the significance of data cannot be overstated, and cybersecurity legislation and standards govern its usage around the globe. Data fuels innovations, steers decisions,…
What Does Zero Trust Mean in Data Security?
Almost every heist movie has a sequence where elaborate plans are created to get the plotters past the heavily guarded perimeter of their target facility. Then, once they’re inside, they drop their disguises and walk around like they own the…
CJIS Security Awareness Training Cheat Sheet
Who’s the last organization you’d expect to be a cyberattack victim? If you answered law enforcement, you’d be correct—but the problem is, it’s happening right now. Police and law enforcement agencies are under cyber assault, and these developments put sensitive…
Playing Dress-Up? How to Train to Spot Websites in Disguise
With Halloween approaching, many are ready for ghosts and costumes. But online, the real threat is from websites masquerading as authentic—but aiming to deceive. Spoofed websites are insidious duplicates of genuine sites, aiming to trick users into sharing sensitive data…
DEF CON 31 – Andrew Brandt’s ‘War Stories – You’re Not George Clooney, And This Isn’t Oceans 11’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
Google Chrome Heap Buffer Overflow Vulnerability (CVE-2023-5217) Notification
Overview Recently, NSFOCUS CERT found that Google officially fixed a zero-day exploit (CVE-2023-5217), which was caused by the heap buffer overflow in the VP8 encoding of the open source libvpx video codec library. An attacker could use this vulnerability to…
Avoid libwebp Electron Woes On macOS With positron
If you’ve got 👀 on this blog (directly, or via syndication) you’d have to have been living under a rock to not know about the libwebp supply chain disaster. An unfortunate casualty of inept programming just happened to be any…