Category: Security Boulevard

Five Tips for Fraud Prevention Month

Boost your security with a few simple actions March is Fraud Prevention Month and what better time to do […] The post Five Tips for Fraud Prevention Month appeared first on NuData Security. The post Five Tips for Fraud Prevention…

PCI Compliance from home

While no one can predict the longer-term global impact of COVID-19, the immediate changes to our daily lives are apparent, specifically – homeworking. Indeed, the advice from almost every Government is unanimous – work from home if you can. The…

XKCD ‘Exa-Exabyte’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Exa-Exabyte’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD ‘Exa-Exabyte’

XKCD ‘Exa-Exabyte’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Exa-Exabyte’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD ‘Exa-Exabyte’

Russia Fronton Tool ‘Will Take Down Entire Countries’

Digital Revolution has dumped a trove of documents showing Putin’s FSB commissioned a powerful DDoS tool. The post Russia Fronton Tool ‘Will Take Down Entire Countries’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete…

Russia Fronton Tool ‘Will Take Down Entire Countries’

Digital Revolution has dumped a trove of documents showing Putin’s FSB commissioned a powerful DDoS tool. The post Russia Fronton Tool ‘Will Take Down Entire Countries’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete…

Women in Cyber Podcast Series: Who is CSN? by Kristin Judge

CSN is working to build 211 cybercrime support hotlines state-by-state, with the ultimate goal of expanding nationwide. Kristin writes after her interview on Verodin’s Cybersecurity Effectiveness Podcast as part of the Women In Cyber series. The post Women in Cyber…

Critical Infrastructure Cybersecurity: Survey Finds Perfect Storm

What are the key findings of the Newsweek survey on the cybersecurity risks of cyber-physical systems for critical infrastructure organizations? The post Critical Infrastructure Cybersecurity: Survey Finds Perfect Storm appeared first on Nozomi Networks. The post Critical Infrastructure Cybersecurity: Survey…

Protecting Remote Workers From Cyber Threats

If you’re reading this from your home while working remotely during the COVID-19 crisis, you’re in good company. A recent study by Global Workplace Analytics showed that even before the coronavirus forced us all into working from home, remote work…

Data Privacy and Security in the Travel Industry

As COVID-19 mauls the travel sector and hotels, airlines and cruise lines shutter their doors or park their planes and ships, this interlude may present them an opportunity to address how they handle passenger information. Each of these sectors of…

Commission Delivers U.S. Cybersecurity Road Map

In the midst of our growing COVID-19 pandemic crisis, a major new U.S. cybersecurity strategy was released by a bipartisan commission on March 11, 2020. This ground-breaking report outlines a strategy to fundamentally reshape the U.S.’s approach to cybersecurity and…

The Joy of Tech® ‘Time Flies’

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® Permalink The post The Joy of Tech® ‘Time Flies’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: The Joy of…

Commission Delivers U.S. Cybersecurity Roadmap

In the midst of our growing COVID-19 pandemic crisis, a major new U.S. cybersecurity strategy was released by a bipartisan commission on March 11, 2020.  This ground-breaking report outlines a strategy to fundamentally reshape the U.S.’s approach to cybersecurity and…

XKCD ‘Coronavirus Worries’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Coronavirus Worries’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD ‘Coronavirus Worries’

The Human Hacking Conference: Year Alpha

It was early in 2019 that we started dropping hints we had something big in the works. The anticipation was high, when, in June, we made an exciting announcement. Social-Engineer.org along with Social-Engineer, LLC was going to put on their…

Bicycles Deemed Best NYC Transit During Pandemic

Nearly a decade ago I wrote about the increase in bicycle sales after disasters. I won’t go into why people moved away from these logical options for transportation and to the illogical gasoline automobile. Kunstler does a good job of…

Report: 97% of Firms Compromised Right Now. Really?

New research is full of alarming statistics about how cyber-compromised most companies are. We rip the report to shreds. The post Report: 97% of Firms Compromised Right Now. Really? appeared first on Security Boulevard.   Advertise on IT Security News. Read…

How to Get JumpCloud Approved by Your Boss

As IT teams work to manage their users remotely, getting vital user/system management tools like JumpCloud approved could help. The post How to Get JumpCloud Approved by Your Boss appeared first on JumpCloud. The post How to Get JumpCloud Approved…

Preparing for Disruption with Good IT

As our colleagues, customers, and friends continue to adapt to the rapidly changing situation with the COVID-19 pandemic, we are facing a global challenge that is unprecedented in the age of technology. The most important thing during this time is……

Cyber Threat Intelligence: Lack of Training, Tools, Oversight

New research cites a lack of training, tools, and oversight for cyber threat intelligence analysts. How to leverage CTI without exposing your organization: The post Cyber Threat Intelligence: Lack of Training, Tools, Oversight appeared first on Security Boulevard.   Advertise…

The Coronavirus Pandemic and the Death of the VPN

Is the onslaught of remote workers as a result of COVID-19 what finally brings VPN technology to its end? The software-as-a-service (SaaS) cloud application boom has fundamentally transformed how businesses operate. Virtually every application now runs in the cloud, making…

Auth0 to Streamline Analysis of Reputation Data

Auth0 has acquired Apility.io in part to gain access to an application programming interface (API) through which curated IP, email and domain reputation data will be fed into the Auth0 anomaly detection engine. Delivered as a service, the Auth0 reputational…

The Oatmeal’s ‘How To Be Socially Distant’

Via The Oatmeal & Also Available As A Downloadable PDF… Our Thanks To Matthew Inman (aka The Oatmeal)! Permalink The post The Oatmeal’s ‘How To Be Socially Distant’ appeared first on Security Boulevard.   Advertise on IT Security News. Read…

Penetration testing for WordPress websites

WordPress powers a lot of websites on the Internet. So it’s no surprise that seasoned attackers and “script-kiddies” like to target WordPress websites. Whether you’re a webmaster, or a security professional, when tasked with assessing the security posture of a…

4 Phishing Protection Gaps that SEGs Cannot Address

A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense report: Between October 2018 and March 2019, 31,429 total threats were reported by…

COVID-19 Fears Bring Google Chrome Dev to Screeching Halt

The novel coronavirus is making Googlers work from home. “Adjusted work schedules” mean the Chrome teams will focus only on security updates, for now. The post COVID-19 Fears Bring Google Chrome Dev to Screeching Halt appeared first on Security Boulevard.…

Everyone is Telecommuting. How to Ensure Cybersecurity

Rush to Telecommuting = Target-Rich Environment for Cyber Criminals As cyber criminals continue their unrelenting assaults and expand their techniques to take advantage of the opportunities created by COVID-19 fears, cybersecurity teams should be sure to keep pace with the…

Top 5 Open Source Serverless Security Tools

Here are some useful open source serverless security tools to help you secure your apps The growing popularity of serverless architecture has led to its massive adoption. My organization has jumped on the serverless bandwagon and it lives up to…

Benefits of System-Based Password Management

With JumpCloud, end users can change their password for virtually all of their resources directly from their computers for security and convenience. The post Benefits of System-Based Password Management appeared first on JumpCloud. The post Benefits of System-Based Password Management…

Contrast Security Advances DevSecOps

Contrast Security this week added a Route Intelligence module to a Contrast Assess vulnerability assessment that automates the code scanning process. Surag Patel, chief strategy officer for Contrast Security, said Route Intelligence employs sensors in the form of lightweight agents…

Vulnerabilities of Multi-Factor Authentication for Remote Working

With many contemplating remote work, securing credentials is vital. Knowing what vulnerabilities may exist in MFA could prevent serious threats. The post Vulnerabilities of Multi-Factor Authentication for Remote Working appeared first on JumpCloud. The post Vulnerabilities of Multi-Factor Authentication for…

Financial Cryptography 2020 Recap

A few weeks ago, we went to the 24th Financial Cryptography (FC) conference and the Workshop on Trusted Smart Contracts (WTSC) workshop, where we presented our work on smart contract bug categorization (see our executive summary), and a poster on…

How scammers exploit Spring Break in the time of COVID-19

Millions of US students and their families have looked forward to a fun-in-the-sun vacation for months now. However, with the Coronavirus outbreak declared a worldwide pandemic, most have either postponed trips or put them off entirely. The socially responsible will…

Secure Virtual Coffee – Top of Mind?

< Deutsch weiter unten> Yes, I am sitting in my Home Office – as you might these days. Maybe the difference is that I am more or less used to this situation, my family knows how to cope with it…

5 Good Reasons to Outsource Security Testing

If you’re a software publisher, security testing is a hugely important part of your process. You must be able to give users the confidence that the products you offer aren’t vulnerable to cyberattacks that could compromise their devices or data.…

Daniel Stori’s ‘Quarantine’

via the inimitable Daniel Stori at turnoff.us Permalink The post Daniel Stori’s ‘Quarantine’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: Daniel Stori’s ‘Quarantine’

Fusion Creates Online Pandemic Readiness Resource

Fusion Risk Management Inc., a provider of disaster recovery software and services, this week announced it will make available an online pandemic readiness toolkit. Company CTO Corey Cowgill said the goal is to provide organizations with timely and reputable resources,…

The Pros and Cons of Password Rotation Policies

Why Password Rotation Policies May No Longer Be Fit-For-Purpose In the Digital Age Forced password resets have been a common feature of password policies for a long time and are still widely used. However, Microsoft and the NIST password guidelines,…

Nine Network Security Topics Grabbing Headlines in Q1 2020

The security landscape is getting more complex as threats like IoT device attacks, fileless malware, and non-email phishing attacks continue to rise. The… The post Nine Network Security Topics Grabbing Headlines in Q1 2020 appeared first on Security Boulevard.  …

The Coronavirus Impacts on Cybersecurity

Protecting Your Website Against Major Threats, Supply-Chain Attacks and Client’s Side Risks on  Coronavirus Times The Coronavirus outbreak has now officially been declared as a global pandemic by the World Health Organization. Along with causing severe health and economic consequences.…

Coronavirus and cybersecurity crime

Consumers and businesses alike have been scrambling to take steps to protect themselves from the coronavirus, from flocking to stores to buy out supplies of hand sanitizer, to encouraging workers to avoid large gatherings and work remotely. While we hope…

5 Security Risks for Companies When Adopting Work from Home

Organizations and companies of all sizes have started adopting work-from-home practices to ensure business continuity and limit employee exposure to a potential viral infection. The post 5 Security Risks for Companies When Adopting Work from Home appeared first on Security…

Why Traditional Security Is Failing Us

This is the first part of a two-part series that explores the reasons behind the failure of security technologies to protect companies and their data from emerging threats in the age of cloud, connected devices and an ever-expanding threat surface.…

Supply Chain Security Amid Coronavirus Fallout

As the impacts of the global spread of COVID-19 continue to be felt by businesses everywhere, one area that is increasingly strained is the supply chain. If your business has not already seen disruption to its supply chain, chances are…

Hackers Use Coronavirus Panic to Push Phishing Email Scams

Phishing scams feeding off of Coronavirus fears have taken advantage of the current state of national emergency to trick concerned citizens into opening malicious PDF’s claiming to help protect them from the disease. The post Hackers Use Coronavirus Panic to…

CoronaVirus Ransomware

These days, when the world is focused on getting a handle on the COVID-19 crisis, cybercriminals are taking advantage of our desire for information. We’re seeing all kinds of attacks leveraging the Coronavirus or COVID-19… The post CoronaVirus Ransomware appeared…

COVID-19 and Remote Work: Crisis & Opportunity

Remote work has gone from”nice to have” to “must do” in a matter of days for many, due to the COVID-19 pandemic. Historically, the federal government and especially the Department of Defense has been reluctant to embrace remote work. Has…