Every so often, podcasts and such will invite me to speak on a variety of topics. And this week, I was very excited to join @cktricky and @sethlaw on the Absolute AppSec podcast. I have known Ken for years, and…
Category: Security Boulevard
Five Tips for Fraud Prevention Month
Boost your security with a few simple actions March is Fraud Prevention Month and what better time to do […] The post Five Tips for Fraud Prevention Month appeared first on NuData Security. The post Five Tips for Fraud Prevention…
A Standard Finally Bridges the Gap
A Standard Finally Bridges the Gap Advertise on IT Security News. Read the complete article: A Standard Finally Bridges the Gap
PCI Compliance from home
While no one can predict the longer-term global impact of COVID-19, the immediate changes to our daily lives are apparent, specifically – homeworking. Indeed, the advice from almost every Government is unanimous – work from home if you can. The…
Douglas J. Leith, PhD: ‘Web Browser Privacy: What Do Browsers Say When The Phone Home?’
A new (published February 24th, 2020) study – targeting web browser chattiness and privacy (whatever may be left, i.e.). Comprised of highly detailed data, and authored by Professor Douglas J. Leith PhD, School of Computer Science & Statistics, Trinity College…
XKCD ‘Exa-Exabyte’
via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Exa-Exabyte’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: XKCD ‘Exa-Exabyte’
Shmoocon 2020 – Ashlee Benge’s & Zack Allen’s ‘Battling Supermutants In The Phishing Wasteland’
Thanks to the 0xdade for publishing these outstanding Shmoocon 2020 Convention videos via the 0xdade YouTube channel and the 0xdade Shmoocon 2020 Playlist for everyone to view, learn and, of course, enjoy. Permalink The post Shmoocon 2020 – Ashlee Benge’s…
XKCD ‘Exa-Exabyte’
via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Exa-Exabyte’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: XKCD ‘Exa-Exabyte’
Shmoocon 2020 – Ashlee Benge’s & Zack Allen’s ‘Battling Supermutants In The Phishing Wasteland’
Thanks to the 0xdade for publishing these outstanding Shmoocon 2020 Convention videos via the 0xdade YouTube channel and the 0xdade Shmoocon 2020 Playlist for everyone to view, learn and, of course, enjoy. Permalink The post Shmoocon 2020 – Ashlee Benge’s…
Russia Fronton Tool ‘Will Take Down Entire Countries’
Digital Revolution has dumped a trove of documents showing Putin’s FSB commissioned a powerful DDoS tool. The post Russia Fronton Tool ‘Will Take Down Entire Countries’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete…
NERC updates may force utility companies into better cybersecurity
Once implemented, these upcoming regulations will ensure electrical utilities are safer from cyber threats, especially those brought in by third parties. Breaches and incidents at utility and other energy-related companies have been rising faster than an electric bill in a…
Russia Fronton Tool ‘Will Take Down Entire Countries’
Digital Revolution has dumped a trove of documents showing Putin’s FSB commissioned a powerful DDoS tool. The post Russia Fronton Tool ‘Will Take Down Entire Countries’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete…
NERC updates may force utility companies into better cybersecurity
Once implemented, these upcoming regulations will ensure electrical utilities are safer from cyber threats, especially those brought in by third parties. Breaches and incidents at utility and other energy-related companies have been rising faster than an electric bill in a…
Women in Cyber Podcast Series: Who is CSN? by Kristin Judge
CSN is working to build 211 cybercrime support hotlines state-by-state, with the ultimate goal of expanding nationwide. Kristin writes after her interview on Verodin’s Cybersecurity Effectiveness Podcast as part of the Women In Cyber series. The post Women in Cyber…
Critical Infrastructure Cybersecurity: Survey Finds Perfect Storm
What are the key findings of the Newsweek survey on the cybersecurity risks of cyber-physical systems for critical infrastructure organizations? The post Critical Infrastructure Cybersecurity: Survey Finds Perfect Storm appeared first on Nozomi Networks. The post Critical Infrastructure Cybersecurity: Survey…
NEW TECH: Start-up QuoLab enters emerging ‘Security Operations Platform’ — SOP — space
Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day. I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR……
COVID-19 & the new telecom reality: traffic management more important than ever
Communication Service Providers (CSPs) are seeing a dramatically increased load on networks as more people each day work from home. With a growing number of employees and businesses working remotely, voice conferencing and video collaboration are driving up traffic. Adding…
As CIOs See Expanding Roles in Customer Experience, Security Must Keep Pace
Let’s face it: CIOs are quite busy as they drive forward with their digital transformation efforts, build their DevOps teams, and continue their work to ensure that their business-technology systems are aligned with business needs — and somewhere within all…
NEW TECH: Start-up QuoLab enters emerging ‘Security Operations Platform’ — SOP — space
Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day. I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR……
As CIOs See Expanding Roles in Customer Experience, Security Must Keep Pace
Let’s face it: CIOs are quite busy as they drive forward with their digital transformation efforts, build their DevOps teams, and continue their work to ensure that their business-technology systems are aligned with business needs — and somewhere within all…
Protecting Remote Workers From Cyber Threats
If you’re reading this from your home while working remotely during the COVID-19 crisis, you’re in good company. A recent study by Global Workplace Analytics showed that even before the coronavirus forced us all into working from home, remote work…
Data Privacy and Security in the Travel Industry
As COVID-19 mauls the travel sector and hotels, airlines and cruise lines shutter their doors or park their planes and ships, this interlude may present them an opportunity to address how they handle passenger information. Each of these sectors of…
COVID-19 Mass Surveillance, New Coronavirus Cyber-Attacks, Encryption Backdoors
In episode 113 for March 23rd 2020: Israel passes an emergency law to use mobile data to track people infected with COVID-19, the latest coronavirus cyber-attacks to be aware of, and how governments world-wide could be putting backdoors into secure…
Commission Delivers U.S. Cybersecurity Road Map
In the midst of our growing COVID-19 pandemic crisis, a major new U.S. cybersecurity strategy was released by a bipartisan commission on March 11, 2020. This ground-breaking report outlines a strategy to fundamentally reshape the U.S.’s approach to cybersecurity and…
Companies use COVID-19 Downtime to Educate their Workforce Online
Organizations see this period of downtime as an opportunity to upskill their personnel to ensure they have needed knowledge, skills and abilities to meet future demands, strengthening the effectiveness and productivity of the entire organization. The post Companies use COVID-19…
The Joy of Tech® ‘Time Flies’
via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® Permalink The post The Joy of Tech® ‘Time Flies’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: The Joy of…
LockPickingLawyer’s ‘[192] IFAM Huno 80 Shutter Lock v. Chinese Copy: Pick, Gut, & Compare’
Thanks to the LockPickingLawyer for publishing his superlative picking videos (via his LockPickingLawyer Channel) for all to see, enjoy and, of course, learn. Permalink The post LockPickingLawyer’s ‘[192] IFAM Huno 80 Shutter Lock v. Chinese Copy: Pick, Gut, & Compare’…
Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 269’
via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics. Permalink The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 269’ appeared first on…
Commission Delivers U.S. Cybersecurity Roadmap
In the midst of our growing COVID-19 pandemic crisis, a major new U.S. cybersecurity strategy was released by a bipartisan commission on March 11, 2020. This ground-breaking report outlines a strategy to fundamentally reshape the U.S.’s approach to cybersecurity and…
LockPickingLawyer’s ‘Using a “Rotar Pick” To Open A Mul-T-Lock Interactive’
Thanks to the LockPickingLawyer for publishing his superlative picking videos via his LockPickingLawyer Channel for all to see, enjoy and, of course, learn. Permalink The post LockPickingLawyer’s ‘Using a “Rotar Pick” To Open A Mul-T-Lock Interactive’ appeared first on Security…
Accelerator Program for Early-Stage Innovations in Water: An Akamai India CSR Flagship Initiative
Written by Neha Jain, Co-Chair of India’s CSR Board Continuing in our commitment to sustainability, Akamai is excited to announce the launch of our accelerator program supporting innovators and building solutions to address India’s water challenges. A concerted effort by……
XKCD ‘Coronavirus Worries’
via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Coronavirus Worries’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: XKCD ‘Coronavirus Worries’
DEF CON 27 Monero Village – Gus Clarke’s ‘Tale Of Two Tongues: Examining Two Mimblewimble Protocols’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via the DEF CON Conference YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Monero Village – Gus Clarke’s…
DEF CON 27 Monero Village – Francisco Cabanas’ ‘Critical Role Of Min Block Reward Trail Emission’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via the DEF CON Conference YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Monero Village – Francisco Cabanas’…
The Human Hacking Conference: Year Alpha
It was early in 2019 that we started dropping hints we had something big in the works. The anticipation was high, when, in June, we made an exciting announcement. Social-Engineer.org along with Social-Engineer, LLC was going to put on their…
Bicycles Deemed Best NYC Transit During Pandemic
Nearly a decade ago I wrote about the increase in bicycle sales after disasters. I won’t go into why people moved away from these logical options for transportation and to the illogical gasoline automobile. Kunstler does a good job of…
Tips for Remote Troubleshooting Mac, Windows, and Linux Systems
Remote troubleshooting in a mixed-OS environment doesn’t have to be a headache. Is your directory service helping as much as it could? The post Tips for Remote Troubleshooting Mac, Windows, and Linux Systems appeared first on JumpCloud. The post Tips…
Signal Sciences Introduces Advanced Rate Limiting for Fast, Easy Protection Against Advanced Web Attacks
Signal Sciences is excited to announce the availability of new advanced rate limiting features that extend our customers’ ability to detect and stop abusive behavior at the application and API layer. Over the past several weeks as part of our……
Report: 97% of Firms Compromised Right Now. Really?
New research is full of alarming statistics about how cyber-compromised most companies are. We rip the report to shreds. The post Report: 97% of Firms Compromised Right Now. Really? appeared first on Security Boulevard. Advertise on IT Security News. Read…
How to Get JumpCloud Approved by Your Boss
As IT teams work to manage their users remotely, getting vital user/system management tools like JumpCloud approved could help. The post How to Get JumpCloud Approved by Your Boss appeared first on JumpCloud. The post How to Get JumpCloud Approved…
Preparing for Disruption with Good IT
As our colleagues, customers, and friends continue to adapt to the rapidly changing situation with the COVID-19 pandemic, we are facing a global challenge that is unprecedented in the age of technology. The most important thing during this time is……
Cyber Threat Intelligence: Lack of Training, Tools, Oversight
New research cites a lack of training, tools, and oversight for cyber threat intelligence analysts. How to leverage CTI without exposing your organization: The post Cyber Threat Intelligence: Lack of Training, Tools, Oversight appeared first on Security Boulevard. Advertise…
DEF CON 27 Monero Village- Diego ‘rehrar’ Salazar’s ‘Monero Is UGLY And DIFFICULT To Use’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via the DEF CON Conference YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Monero Village- Diego ‘rehrar’ Salazar’s…
Managing Cybersecurity with the Coronavirus Response and Sudden Spike in Remote Workers
Companies around the world have suddenly had to shift to an entirely remote workforce in response to the COVID-19 pandemic. The spike in work from home activity also expands the attack surfaces and poses an increase cybersecurity risk. The post…
Hackers Actively Exploiting Enterprise VPN Bugs Amid Covid-19 Telework Trend, says DHS
The Coronavirus pandemic has prompted numerous organizations to consider alternate workplaces for employees, in line with recommendations from the World Health Organization. Now the Department of Homeland Security’s (DHS) Cybersecurity & Infrastructure Security Agency (CISA) is issuing a similar alert,…
The Coronavirus Pandemic and the Death of the VPN
Is the onslaught of remote workers as a result of COVID-19 what finally brings VPN technology to its end? The software-as-a-service (SaaS) cloud application boom has fundamentally transformed how businesses operate. Virtually every application now runs in the cloud, making…
Auth0 to Streamline Analysis of Reputation Data
Auth0 has acquired Apility.io in part to gain access to an application programming interface (API) through which curated IP, email and domain reputation data will be fed into the Auth0 anomaly detection engine. Delivered as a service, the Auth0 reputational…
The Imperial College COVID-19 Response Team’s ‘Impact Of Non-Pharmaceutical Interventions (NPIs) To Reduce COVID- 19 Mortality And Healthcare Demand’ Report
Click On The Title To Download The Report Permalink The post The Imperial College COVID-19 Response Team’s ‘Impact Of Non-Pharmaceutical Interventions (NPIs) To Reduce COVID- 19 Mortality And Healthcare Demand’ Report appeared first on Security Boulevard. Advertise on IT…
The pros, cons and limitations of AI and machine learning in antivirus software
Some antivirus vendors are marketing AI and machine learning as the silver bullet to malware, but is there any truth to these claims? The post The pros, cons and limitations of AI and machine learning in antivirus software appeared first…
The Oatmeal’s ‘How To Be Socially Distant’
Via The Oatmeal & Also Available As A Downloadable PDF… Our Thanks To Matthew Inman (aka The Oatmeal)! Permalink The post The Oatmeal’s ‘How To Be Socially Distant’ appeared first on Security Boulevard. Advertise on IT Security News. Read…
Penetration testing for WordPress websites
WordPress powers a lot of websites on the Internet. So it’s no surprise that seasoned attackers and “script-kiddies” like to target WordPress websites. Whether you’re a webmaster, or a security professional, when tasked with assessing the security posture of a…
Best-of-Breed Solutions or an All-in-One Platform? Addressing the Age-Old Question in the Modern Era
Do you get more bang for your buck by leveraging an arsenal of best-of-breed solutions or choosing an all-in-one platform? The answer here. The post Best-of-Breed Solutions or an All-in-One Platform? Addressing the Age-Old Question in the Modern Era appeared…
DEF CON 27 Monero Village – Daniel Kim’s ‘Keynote Speech: Monero Introduction And Investor Perspective’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via the DEF CON Conference YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Monero Village – Daniel Kim’s…
4 Phishing Protection Gaps that SEGs Cannot Address
A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense report: Between October 2018 and March 2019, 31,429 total threats were reported by…
Forrester Names Bitdefender ‘the biggest EDR vendor you haven’t considered but should have’ in 2020 WAVE for EDR
Bitdefender, a leading global cybersecurity company protecting over 500 million systems worldwide, has been named a “strong performer” in The Forrester Wave™: Enterprise Detection And Response, Q1 2020 report, based on its offering, strategy and market presence. The post Forrester…
DEF CON 27 Monero Village – Cathie Yun’s ‘Bulletproofs Deep Dive’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via the DEF CON Conference YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Monero Village – Cathie Yun’s…
COVID-19 Fears Bring Google Chrome Dev to Screeching Halt
The novel coronavirus is making Googlers work from home. “Adjusted work schedules” mean the Chrome teams will focus only on security updates, for now. The post COVID-19 Fears Bring Google Chrome Dev to Screeching Halt appeared first on Security Boulevard.…
Everyone is Telecommuting. How to Ensure Cybersecurity
Rush to Telecommuting = Target-Rich Environment for Cyber Criminals As cyber criminals continue their unrelenting assaults and expand their techniques to take advantage of the opportunities created by COVID-19 fears, cybersecurity teams should be sure to keep pace with the…
Sladjana Jovanovic and Bill McArthur Move Silos to Communities [VIDEO]
Editor’s Note: The chapter, “From Silos to Communities” is included in Epic Failures in DevSecOps, Volume 2, which is available for free download. “What Bill didn’t talk about was that this pod was technically improving the platform in a way…
How to Protect Your VPN: Lessons From a DDoS Attack Test
In the wake of the COVID-19 pandemic, many IT organizations find themselves scrambling to meet the sudden spike in VPN traffic. The post How to Protect Your VPN: Lessons From a DDoS Attack Test appeared first on Radware Blog. The…
More Business Websites Hit by Credit-card Skimming Malware
In the last few days it has come to light that blender manufacturer NutriBullet and guitar tuition website Truefire fell foul of hackers who planted Magecart-style malicious code on their sites which went undetected for months, stealing the credit card…
40% of Fortune 1000 Companies Will Suffer a Breach Every Year, New Research Suggests
Over 60% of the Fortune 1000 had at least one public breach over the last decade. Things have improved in recent times, but not by much. Researchers now estimate that 40% of the firms on the list will suffer a…
Top 5 Open Source Serverless Security Tools
Here are some useful open source serverless security tools to help you secure your apps The growing popularity of serverless architecture has led to its massive adoption. My organization has jumped on the serverless bandwagon and it lives up to…
Benefits of System-Based Password Management
With JumpCloud, end users can change their password for virtually all of their resources directly from their computers for security and convenience. The post Benefits of System-Based Password Management appeared first on JumpCloud. The post Benefits of System-Based Password Management…
DEF CON 27 Monero Village – Amir Montazery’s ‘The Cost Of Good Open Source Software’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via the DEF CON Conference YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Monero Village – Amir Montazery’s…
Contrast Security Advances DevSecOps
Contrast Security this week added a Route Intelligence module to a Contrast Assess vulnerability assessment that automates the code scanning process. Surag Patel, chief strategy officer for Contrast Security, said Route Intelligence employs sensors in the form of lightweight agents…
Cyber Security Considerations for Protecting Remote Employee Devices and Remote Access Environments
With COVID-19 (Coronavirus) being declared a pandemic by the World Health Organization, many organizations have asked employees to work remotely and/or restrict travel. In addition, hackers are using this opportunity to step up their activity. As more employees shift to…
Open source software use grows in Germany, but compliance and risk management need improvement
A new report from Bitkom reveals that among companies that use open source, many aren’t sure of the best way to approach open source risk management. The post Open source software use grows in Germany, but compliance and risk management…
Vulnerabilities of Multi-Factor Authentication for Remote Working
With many contemplating remote work, securing credentials is vital. Knowing what vulnerabilities may exist in MFA could prevent serious threats. The post Vulnerabilities of Multi-Factor Authentication for Remote Working appeared first on JumpCloud. The post Vulnerabilities of Multi-Factor Authentication for…
Financial Cryptography 2020 Recap
A few weeks ago, we went to the 24th Financial Cryptography (FC) conference and the Workshop on Trusted Smart Contracts (WTSC) workshop, where we presented our work on smart contract bug categorization (see our executive summary), and a poster on…
SHARED INTEL: FireMon survey shows security lags behind fast pace of hybrid cloud deployments
Corporate America’s love affair with cloud computing has hit a feverish pitch. Yet ignorance persists when it comes to a momentous challenge at hand: how to go about tapping the benefits of digital transformation while also keeping cyber exposures ……
Don’t Take Our Word for It – Listen to Our Customers
Gartner’s Voice of the Customer series (which to date (since October 2015) has featured well over 320,000 reviews across more than 330 markets), has played a key role in educating organizations about the tools that they are considering deploying. We…
How scammers exploit Spring Break in the time of COVID-19
Millions of US students and their families have looked forward to a fun-in-the-sun vacation for months now. However, with the Coronavirus outbreak declared a worldwide pandemic, most have either postponed trips or put them off entirely. The socially responsible will…
Secure Virtual Coffee – Top of Mind?
< Deutsch weiter unten> Yes, I am sitting in my Home Office – as you might these days. Maybe the difference is that I am more or less used to this situation, my family knows how to cope with it…
Sumo, StackRox, and Goldilocks – Hitting the Sweet Spot in Securing Business Insights
I’ve always said the best part of my job is talking to customers – especially happy customers! – and I got that chance a couple weeks ago in interviewing George Gerchow, the chief security officer at Sumo Logic. George is…
New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong
Bitdefender researchers have discovered a new TrickBot module (rdpScanDll) built for RDP bruteforcing operations on select targets. The new module was discovered on January 30 and, based on the IP addresses it targets, victims seem to be US and Hong…
5 Good Reasons to Outsource Security Testing
If you’re a software publisher, security testing is a hugely important part of your process. You must be able to give users the confidence that the products you offer aren’t vulnerable to cyberattacks that could compromise their devices or data.…
Immediate Free Website Protection Against Third-Party Risks During the Covid-19 Crisis
Supply-chain attacks, website third-party risks, client-side threats, Magecart attacks, foam-jacking…, It’s all there, threatening your most valuable asset. Well, don’t let it bother you these days. We will get you fully covered, and it’s all free now! The current Covid-19…
DEF CON 27 Monero Village – AJ Santos’ ‘Houston We Have A Problem: 86R HB 4371 Is A No-Go Video’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Monero Village – AJ Santos’ ‘Houston We Have…
LoginRadius Announces Its Business Continuity Plan to Fight COVID-19 Outbreak
COVID-19 is a global epidemic that demands decisive and robust action. The post LoginRadius Announces Its Business Continuity Plan to Fight COVID-19 Outbreak appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: LoginRadius Announces…
Daniel Stori’s ‘Quarantine’
via the inimitable Daniel Stori at turnoff.us Permalink The post Daniel Stori’s ‘Quarantine’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: Daniel Stori’s ‘Quarantine’
DEF CON 27 Monero Village – Justin Ehrenhofer’s ‘Improving Monero Release Schedule’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Monero Village – Justin Ehrenhofer’s ‘Improving Monero Release…
A Message from Our CEO: Working Together in Unprecedented Times
The CyberArk Response to COVID-19 We are living in an unprecedented time as the world quickly adjusts to the rapidly changing dynamics created by COVID-19. During this challenging time, at CyberArk we believe it is… The post A Message from…
Fusion Creates Online Pandemic Readiness Resource
Fusion Risk Management Inc., a provider of disaster recovery software and services, this week announced it will make available an online pandemic readiness toolkit. Company CTO Corey Cowgill said the goal is to provide organizations with timely and reputable resources,…
NEW TECH: Can MPC — Multi Party Computation — disrupt encryption, boost cloud commerce?
Encryption is a cornerstone of digital commerce. But it has also proven to be a profound constraint on the full blossoming of cloud computing and the Internet of Things. Related: A ‘homomorphic-like’ encryption solution We know very well how to…
In the Face of a Pandemic, Cyberattackers Seek to Take Advantage
Cyberattackers live for moments of crisis and confusion. Government agencies and companies already stretched thin are at their most vulnerable, and cyberattackers are all too willing to apply overwhelming pressure to maliciously disrupt operations or gain some financial benefit. As…
The Pros and Cons of Password Rotation Policies
Why Password Rotation Policies May No Longer Be Fit-For-Purpose In the Digital Age Forced password resets have been a common feature of password policies for a long time and are still widely used. However, Microsoft and the NIST password guidelines,…
Infosec Pros Agree Human Skills Matter Most in a Cybersecurity Stack
Artificial Intelligence (AI) and Machine Learning (ML) offer considerable advantages for cybersecurity professionals, especially in the face of the technology talent gap that has left 45 percent of companies with an understaffed cybersecurity team. The post Infosec Pros Agree Human…
Nine Network Security Topics Grabbing Headlines in Q1 2020
The security landscape is getting more complex as threats like IoT device attacks, fileless malware, and non-email phishing attacks continue to rise. The… The post Nine Network Security Topics Grabbing Headlines in Q1 2020 appeared first on Security Boulevard. …
The Coronavirus Impacts on Cybersecurity
Protecting Your Website Against Major Threats, Supply-Chain Attacks and Client’s Side Risks on Coronavirus Times The Coronavirus outbreak has now officially been declared as a global pandemic by the World Health Organization. Along with causing severe health and economic consequences.…
Future of Cybersecurity Threats – Looking Ahead So We Can Prepare Now
The post Future of Cybersecurity Threats – Looking Ahead So We Can Prepare Now appeared first on CCSI. The post Future of Cybersecurity Threats – Looking Ahead So We Can Prepare Now appeared first on Security Boulevard. Advertise on…
Coronavirus and cybersecurity crime
Consumers and businesses alike have been scrambling to take steps to protect themselves from the coronavirus, from flocking to stores to buy out supplies of hand sanitizer, to encouraging workers to avoid large gatherings and work remotely. While we hope…
As coronavirus spreads, attackers won’t let up on healthcare systems
As healthcare providers and public health agencies around the world find themselves pressed at capacity to deliver care during the novel coronavirus pandemic, attackers show no signs of mercy as they still target healthcare websites and IT systems — further…
5 Security Risks for Companies When Adopting Work from Home
Organizations and companies of all sizes have started adopting work-from-home practices to ensure business continuity and limit employee exposure to a potential viral infection. The post 5 Security Risks for Companies When Adopting Work from Home appeared first on Security…
Why Traditional Security Is Failing Us
This is the first part of a two-part series that explores the reasons behind the failure of security technologies to protect companies and their data from emerging threats in the age of cloud, connected devices and an ever-expanding threat surface.…
Supply Chain Security Amid Coronavirus Fallout
As the impacts of the global spread of COVID-19 continue to be felt by businesses everywhere, one area that is increasingly strained is the supply chain. If your business has not already seen disruption to its supply chain, chances are…
Hackers Use Coronavirus Panic to Push Phishing Email Scams
Phishing scams feeding off of Coronavirus fears have taken advantage of the current state of national emergency to trick concerned citizens into opening malicious PDF’s claiming to help protect them from the disease. The post Hackers Use Coronavirus Panic to…
CoronaVirus Ransomware
These days, when the world is focused on getting a handle on the COVID-19 crisis, cybercriminals are taking advantage of our desire for information. We’re seeing all kinds of attacks leveraging the Coronavirus or COVID-19… The post CoronaVirus Ransomware appeared…
2014, TED – Bill Gates: The Next Outbreak? We’re Not Ready’
Precognition? Indeed. Astute Scrutiny of Attendant Risk? Of course. Permalink The post 2014, TED – Bill Gates: The Next Outbreak? We’re Not Ready’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: 2014, TED…
COVID-19 and Remote Work: Crisis & Opportunity
Remote work has gone from”nice to have” to “must do” in a matter of days for many, due to the COVID-19 pandemic. Historically, the federal government and especially the Department of Defense has been reluctant to embrace remote work. Has…