Imperva is pleased to announce UserVoice, a new product feedback system that allows YOU to shape the future of Imperva product lines. UserVoice empowers Imperva users to share feedback and ideas in one comprehensive, crowd-sourced place where they can also…
Category: Security Boulevard
VICE: Iran Launched A Mobile App That Claimed To Diagnose Coronavirus
Image via Maxar via David Gilbert, writing at Vice comes this outstanding piece on the despots running Iran into the ground. Literally. ‘”Dear compatriots, before going to the hospital or health center, install and use this software to determine if…
ForAllSecure’s Response to COVID-19
COVID-19 is a global pandemic that affects everyone. We all need to work together, and I wanted to share with you some of the things ForAllSecure is doing. The post ForAllSecure’s Response to COVID-19 appeared first on Security Boulevard. …
When Developing from Home is Your New Status Quo Due to COVID-19
This past week is one we’ll never forget, even though many of us would like to do so. Beyond massive economic and social impact, the coronavirus disease (COVID-19) is massively disrupting how we live and work. From global travel restrictions…
Triangulation fraud: coming to an eCommerce site near you
Both retailers and cardholders are falling prey to triangulation fraud, involving an unscrupulous intermediary of which neither are even aware. With […] The post Triangulation fraud: coming to an eCommerce site near you appeared first on NuData Security. The post Triangulation fraud:…
Social Distancing & Cybersecurity Desk Audits to Stem the Spread of COVID-19
What is Social Distancing? As of the writing of this blog, many health officials are suggesting that social distancing may be one of the most effective tools for slowing the spread of COVID–19. Social distancing is a public-health protection measure…
ZeroNorth Raises $10M to Advance Risk Orchestration
ZeroNorth, a provider of a namesake platform for orchestrating risk management within the context of application development projects, announced it has garnered another $10 million in funding. Company CEO John Worrall said most of the funds are earmarked to advance…
XKCD ‘2010 and 2020’
via the comic delivery system monikered Randall Munroe at XKCD! The post XKCD ‘2010 and 2020’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: XKCD ‘2010 and 2020’
What is security debt, and how do I get out of it?
Security debt refers to the accumulation of vulnerabilities in your software that make it harder to protect your data and systems. How do you get rid of it? The post What is security debt, and how do I get out…
Stabilize IT Budgets by Converting CapEx to OpEx
Capital expenditures can be difficult to budget for, especially in IT. Learn how to convert them to more predictable operational expenditures instead. The post Stabilize IT Budgets by Converting CapEx to OpEx appeared first on JumpCloud. The post Stabilize IT…
Women in Cyber Podcast Series: Why Security Culture Matters by Masha Sedova
Every organization has a security culture, either good or bad, even if the security team has never invested in it. The post Women in Cyber Podcast Series: Why Security Culture Matters by Masha Sedova appeared first on Security Boulevard. …
SecZetta and Focal Point Announce New Partnership to Strengthen Third-Party Identity and Lifecycle Management
FALL RIVER, Mass. & TAMPA, Fla.–(BUSINESS WIRE)–SecZetta, the leading provider of third-party identity management solutions, and Focal Point, a leading cybersecurity services provider, today announced a new solution integrator partnership. Together, SecZetta and Focal Point provide clients with a 360° view…
How to Fix Warning “Your Connection is Not Private” Warning?
The post How to Fix Warning “Your Connection is Not Private” Warning? appeared first on MalCare. The post How to Fix Warning “Your Connection is Not Private” Warning? appeared first on Security Boulevard. Advertise on IT Security News. Read…
Trivy Vulnerability Scanner from Aqua Security Adopted by Leading Cloud Native Platforms
BOSTON – March 16, 2020 – Aqua Security, the leading platform provider for securing cloud native applications and infrastructure, announced today that its open source Trivy vulnerability scanner is now available as an integrated option in several widely used cloud…
82 Percent of Organizations Still Use Spreadsheets to Manage Third Parties
A main tenet of managing vendor risk is knowing your third parties. A recent study by Forrester Research reported that four out of five organizations still use spreadsheets to inventory, assess, and manage third-party relationships. Find out where organizations miss…
Conquering Cyberthreats as the Cloud Booms
As the cloud proliferates rapidly into every corner of an organization, it?s time to reimagine your approach to cybersecurity. The post Conquering Cyberthreats as the Cloud Booms appeared first on Security Boulevard. Advertise on IT Security News. Read the…
7 Linux Distros for Security Testing
Linux is often talked about when it comes to security. With this OS, you can choose from a multitude of distributions (distros) to lock down your computer or device, but that’s just for starters. Many Linux distros come with tools…
Storage Is Your Data Lifecycle Weak Spot
Privacy regulations have put more emphasis on data security. When we talk about data security and privacy, it’s often discussed as though the protection covers everything equally. But all data isn’t equal; it needs to be treated differently in each…
IT Fire Drill: Remote Access Expansion Under COVID-19
Remote Access Expansion: How can IT ensure and scale safe access for multiple business-critical scenarios, while protecting existing technology investments? The post IT Fire Drill: Remote Access Expansion Under COVID-19 appeared first on Security Boulevard. Advertise on IT Security…
Eliminate Identity Silos from Azure AD
Siloed identities can be dangerous for an organization’s security posture, and as such, should be eliminated wherever possible. The post Eliminate Identity Silos from Azure AD appeared first on JumpCloud. The post Eliminate Identity Silos from Azure AD appeared first…
Coronavirus Guidance from Our Nation’s Governors and State CIOs
After a historic week of dramatic disruptions to our way of life in America stemming from the coronavirus (COVID-19) global pandemic, President Trump declared a national emergency on Friday, March 13, releasing $50 billion to states and territories to fight…
Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 268’
via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics. Permalink The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 268’ appeared first on…
DEF CON 27 Monero Village – Sarang Noether PhD’ ‘If You Like It Put a Ring Signature On It’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Monero Village – Sarang Noether PhD’ ‘If You…
SSO for LDAP Apps
IT admins can enable workflows for on-prem and cloud LDAP apps that are similar to the workflows for SaaS apps that use SAML. The post SSO for LDAP Apps appeared first on JumpCloud. The post SSO for LDAP Apps appeared…
The Oatmeal’s (Matthew Inman) ‘Touch Your Face Less’
Also Available From The Oatmeal As A Downloadable PDF… Our Thanks To Matthew Inman (also known as The Oatmeal)! Permalink The post The Oatmeal’s (Matthew Inman) ‘Touch Your Face Less’ appeared first on Security Boulevard. Advertise on IT Security…
“Please Inform Your Readers”: Best and Worst Visualizations of COVID-19
I’ve written several times recently about big data and visualization issues for the COVID-19 pandemic. March 3: Visualizing Coronavirus Spread: Many Tools, Results Vary Widely March 8: America Admits to Cooking its Numbers on Coronavirus March 11: Why Big Data…
Easily Migrate from Active Directory with New JumpCloud Tool
The new Active Directory Migration Utility (ADMU) is automating the process of migrating users and systems from AD into JumpCloud. The post Easily Migrate from Active Directory with New JumpCloud Tool appeared first on JumpCloud. The post Easily Migrate from…
DEF CON 27 Monero Village – Vik Sharma’s ‘Creating Cake From Scratch’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27 Monero Village – Vik Sharma’s ‘Creating Cake From…
The Joy of Tech® ‘Remote Control!’
via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® Permalink The post The Joy of Tech® ‘Remote Control!’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: The Joy of Tech® ‘Remote Control!’
DEF CON 27, Packet Hacking Village – Cesare Pizzi’s ‘Sandbox Creative Usage For Fun and Problems’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Packet Hacking Village – Cesare Pizzi’s ‘Sandbox Creative…
Multi-Tenancy for MSPs
Multi-tenancy holds great value for MSPs who need to manage all of their clients from a single pane of glass. The post Multi-Tenancy for MSPs appeared first on JumpCloud. The post Multi-Tenancy for MSPs appeared first on Security Boulevard. …
The Four Signs of an Effective Compliance Program: Quality, Consistency, Oversight and Efficiency
An effective compliance program has a critical impact on an organization’s ability to operate with integrity, consistency, quality … Read More The post The Four Signs of an Effective Compliance Program: Quality, Consistency, Oversight and Efficiency appeared first on Hyperproof.…
What is your GCP infra worth?…about ~$700 [Bugbounty]
What is your GCP infra worth?…about ~$700 [Bugbounty] Advertise on IT Security News. Read the complete article: What is your GCP infra worth?…about ~$700 [Bugbounty]
Boost manufacturing security with a vendor access management strategy
In our previous blog, we explained how cyberattacks are putting manufacturing systems at greater risk of data loss and malicious activity. Now let’s look at strategies companies can take to tighten up some of the security gaps that can leave…
Emsisoft Emergency Kit 2020.3.2 beta
We’ve just released Emsisoft Emergency Kit 2020.3.2.10048 beta. You will have to enable beta updates to get this version. Fixed: Issue with driver not unloading after program exit. Several minor fixes. The post Emsisoft Emergency Kit 2020.3.2 beta appeared first…
Improving Customer Experience in the Hospitality Industry
The hospitality industry has always been about luxury, pleasure, and excellent customer services. Modern guests travel for both business and pleasure. Therefore, they expect business owners to interact better and understand them well. The post Improving Customer Experience in the…
Alert Logic COVID-19 Preparedness and Response
Alert Logic CEO Bob Lyons explains the steps the company is taking to be prudent in helping fight the spread of COVID-19 and the actions taken to protect employees and the community while maintaining our commitment to keep customers secure.…
DEF CON 27, Packet Hacking Village – Besim Altinok’s ‘Wi Fi Threat Modeling And Monitoring’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Packet Hacking Village – Besim Altinok’s ‘Wi Fi…
Phishing attacks exploit Coronavirus anxiety
In the past week, there have been many reports about criminal activity exploiting people’s fears of the coronavirus, aka Covid-19. The U.S. Secret Service, the World Health Organization (WHO) and the United Nations have all issued warnings to U.S. and…
XKCD ‘Symptoms’
via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Symptoms’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: XKCD ‘Symptoms’
DEF CON 27, Packet Hacking Village – Adam’s (@sneakernet72) ‘Security To Make The CFO Happy’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Packet Hacking Village – Adam’s (@sneakernet72) ‘Security To…
ConnectWise Strengthening its Security Posture
Emphasizes “Shift Left” in Software Development Cycle, Independent Third-Party Testing and Commitment to Transparency TAMPA, Fla. (March 13, 2020) – ConnectWise, the leading provider of business automation software for technology solution providers (TSPs), today announced updates it is taking to…
Managing Nexus API Using Jenkins X
In my last post, Jenkins X — Managing Jenkins, I talked about how we manage our Jenkins server. This time around, I’ll be looking at the Nexus server and how it too can be similarly managed. Current Status Jenkins X…
Political campaigns and your personal data
During this American presidential election campaign season, politicians have scored points calling out tech companies for abusing the personal data of their users. Yet many political campaigns are engaged in very similar practices. Political campaigns are now sophisticated data operations…
Transforming Security Through Zero Trust
You may have heard the phrase “zero trust” being thrown around quite a bit lately. While it may sound dystopian, zero trust is, I believe, a framework that embodies not only a concept but some of the cybersecurity best practices…
Dealing With Viruses, Computer and Biological
In the wake of the COVID-19 pandemic, companies are increasingly calling on employees to work from home. Hospitals, clinics and doctor’s offices are preparing for massive numbers of infections, not only of patients but also healthcare workers. Colleges and universities…
Provide Secure Access for Everyone
The hub-and-spoke network model is outdated Safeguarding Internet access is a significant problem for most businesses. In a recent Verizon Study, 6.2 percent of all data breaches result from browser-based attacks. These attacks, including watering-hole and drive-by downloads, can…
The spies in our cell networks
CEO walks out of nondescript office building accompanied by COLLEAGUE. CEO pulls smartphone out of her purse to study a restaurant’s website. Her smartphone’s status bar blinks briefly to indicate a change in cellular connection status. The post The spies…
New Feature: Automated Migration from AD to JumpCloud
JumpCloud’s new Active Directory Migration Utility automates a key part of switching from AD to a modern cloud directory service. The post New Feature: Automated Migration from AD to JumpCloud appeared first on JumpCloud. The post New Feature: Automated Migration…
Phaxttachments Are Latest Spin on Phishing Attacks
Looks like cybercriminals have come up with yet another innovative means to distribute malware. Researchers at Inky, which provides tools to combat phishing attacks, have discovered that cybercriminals are now sending emails that come with fake attachments, known as phaxttachments.…
Windows 10 Suffers Yet Another Wormable Zero-Day
Here we go again: An SMB vulnerability lets hackers access your Windows clients and servers. And there’s no patch (yet). The post Windows 10 Suffers Yet Another Wormable Zero-Day appeared first on Security Boulevard. Advertise on IT Security News. Read…
Odo Security Offers Free Remote Access Solution for Employees Working from Home During the Coronavirus Outbreak
TEL AVIV, Israel and SAN FRANCISCO, March 12, 2020 (GLOBE NEWSWIRE) — Odo Security, a leader in zero trust network access (ZTNA) and management, today announced it is offering free subscriptions to its market-leading secure remote access solution, OdoAccess, to…
DEF CON 27, Packet Hacking Village – Cheryl Biswas’ ‘Patching: It Is Complicated’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Packet Hacking Village – Cheryl Biswas’ ‘Patching: It…
Partner Best Practices for Remote Incident Response and Assessment Service Delivery
In the past, Incident Responders and Security Analysts had to fly out to a network to help contain and investigate an incident on-site, or complete a Threat and Compromise Assessment. Even without coronavirus fears, this practice is becoming less and…
Healthcare Communications During a Crisis
Healthcare workers are turning to technology to address the rapid spread of the Coronavirus. The pandemic is providing unique challenges—like finding ways to screen and treat patients while still containing the virus. Private communications tools can help healthcare workers address…
Learn new languages while practicing COVID-19 safety
File this “Aviation Without Borders: Integrated Humanitarian Solutions” site under safety awareness campaigns. Free posters have been translated into 21 languages describe how to help prevent the spread of COVID-19 Our posters provide basic hygiene and preventative directions in as…
Introducing alternative routing to prevent censorship of Proton apps
We’re announcing today a new anti-censorship system that can help users access our website if their government, ISP, or network administrator has blocked Proton services. The alternative routing feature is not yet deployed as of writing, but in the coming…
Women in Cyber Podcast Series: The Evolution of Cybersecurity by Lysa Myers
Having been in this industry for 20 years, a lot has changed since Lysa started. This podcast, she says, was a great chance to reflect on how much things have evolved, even if our everyday activities may sometimes seem to…
How Not to Pay a Ransom (Twice)
I can say it until I’m blue in the face: don’t pay the ransom, ever. Period. Even if you’re the victim of a ransomware attack, don’t pay the hackers. In fact, I wrote an article explaining why paying the ransom…
Security with Extended Berkeley Packet Filter and PAM
Extended Berkeley Packet Filter (ePBF) has been circulating the developer arena for quite some time. The original BPF was developed nearly three decades ago by US national laboratory research scientists as an architecture for Unix… The post Security with Extended…
Coronavirus: Its Four Most Prevalent Cyber Threats
The attack surface is changing & expanding as many organizations move to online and digital experiences in an effort to inhibit the spread of COVID-19. The post Coronavirus: Its Four Most Prevalent Cyber Threats appeared first on Radware Blog. The…
SHARED INTEL: Bogus Coronavirus email alerts underscore risk posed by weaponized email
It comes as no surprise that top cyber crime rings immediately pounced on the Coronavirus outbreak to spread a potent strain of malware via malicious email and web links. Related: Credential stuffing fuels cyber fraud IBM X-Force researchers shared details……
Cybercriminals taking advantage of the Coronavirus
In recent weeks, we have witnessed cybercriminals trying to cash in on global fears about the novel coronavirus. Analysts across various intelligence vendors have observed that cybercriminals are taking advantage of the outbreak. As many individuals search for the latest…
Web Content Filter Myths Impacting K-12 Cybersecurity & Safety
Misunderstandings about what a web content filter can do is putting K-12 district data at risk There are several cybersecurity myths circulating in the K-12 IT world. Perhaps the most pervasive I’ve come across is the idea that a web…
Shared Responsibility in Data Security
We need to reassess how we define data security and where we place responsibility in protecting our data online. Over the past decade, consumers have enjoyed increasingly convenient, often free services in exchange for sharing their personal data. While we…
Redefining Bot Detection: Why Identity Matters
Castle launches Identity-Aware Bot Detection! This new product addresses the increasing risk of automated bot attacks imitating legitimate human behavior. The post Redefining Bot Detection: Why Identity Matters appeared first on Security Boulevard. Advertise on IT Security News. Read…
MedusaLocker Leaves No Network Drive Safe
As it stands, ransomware is the cybersecurity problem that refuses to disappear. What started as malware specifically targeting home users is now targeting government departments and enterprise organizations. Not even Fortune 500 companies are safe from being infected, despite often…
ForgeRock Secure Sharing Ingredients: Who, What and How
In my previous blog, I described the ForgeRock Secure Sharing solution, which enables people to share their digital resources selectively with others in an enforceable way. How exactly do we do that? Let’s start with the three main ingredients: Who: Authenticated…
Five ways cyberattacks put manufacturing systems at risk
Some industries, like financial services and healthcare, have been targets of cyberattacks since day one. For years, manufacturing seemed far less interesting to hackers, and even C-suite executives at these companies weren’t particularly worried about the risk of attack. However,…
Introducing 1-Click NIST Password Standard Compliance & More
Introducing one-click NIST password standard compliance, user reporting which outlines users who are using compromised passwords, and root password detection to prevent users from using root passwords. Microsoft’s Active Directory is used widely across companies and industries throughout the world…
DEF CON 27, Packet Hacking Village – Emilio Couto’s ‘CIRCO: Cisco Implant Raspberry Controlled Ops’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Packet Hacking Village – Emilio Couto’s ‘CIRCO: Cisco…
The Joy of Tech® ‘Your Smartphone Is Disgusting’
via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® Permalink The post The Joy of Tech® ‘Your Smartphone Is Disgusting’ appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: The Joy of Tech® ‘Your Smartphone Is…
Secure Transactions: A PCI-DSS & PA-DSS Overview and Compliance Checklist
secure-transactions-pci-dss-pa-dss-overview-and-compliance-checklist-700×350.png Language Undefined Uncategorized With the advent of the Internet in the late 1990s, credit card fraud surged. Though credit card companies came out with their own individual security programs, merchants accepting multiple types of credit cards had difficulty meeting…
Risk Mitigation Requires Complete Visibility
You can’t fully mitigate risk without a complete picture of what you must manage. However, visibility is a moving target as new endpoints and devices are added to your infrastructure daily. To maintain full visibility of rapidly scaling and increasingly complex hybrid environments, you must be able to take…
Advance Your Modernize IAM Program With ForgeRock’s New Accelerators
There’s more pressure than ever to compete in today’s digital market. New demands require new technology that is interoperable across digital ecosystems and is capable of knowing, securing, and serving your audience at any touchpoint. The foundation to enabling…
MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security
Speed is what digital transformation is all about. Organizations are increasingly outsourcing IT workloads to cloud service providers and looking to leverage IoT systems. Related: The API attack vector expands Speed translates into innovation agility. But it also results in…
How To Remove ‘Deceptive Site Ahead’ Warning?
The post How To Remove ‘Deceptive Site Ahead’ Warning? appeared first on MalCare. The post How To Remove ‘Deceptive Site Ahead’ Warning? appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: How To Remove…
How to prevent the data breach that keeps on happening
Language English Tags: <a href=’/blog?tag=IT Security’>IT Security</a> <a href=’/blog?tag=Internal Threats’>Internal Threats</a> <a href=’/blog?tag=Compliance’>Compliance</a> By Dr Steve Jeffery, pre-sales engineer The potential for revealing personally identifiable information (PII) in the ‘To’ or ‘CC’ fields of an email is a risk well…
How To Easily Repair Hacked Website? (Complete Guide)
The post How To Easily Repair Hacked Website? (Complete Guide) appeared first on MalCare. The post How To Easily Repair Hacked Website? (Complete Guide) appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: How…
IT Leaders Aim to Outgun Hackers with Bigger Cybersecurity Budgets in 2020
More than half of IT professionals are extremely concerned about the security of corporate endpoints in the face of sophisticated attack vectors like ransomware, disruptionware, phishing and others. The post IT Leaders Aim to Outgun Hackers with Bigger Cybersecurity Budgets…
The Security Challenges of the Cloud
As more companies transition to the cloud, their sensitive corporate- and compliance-related data are no longer stored and used behind multiple layers of perimeter security. Instead, security teams are faced with multiple cloud services, each with its own type of…
Report Details Security Threats Posed by Cloud File Services
A report published today by Menlo Security, a provider of a global cloud proxy platform, details the degree to which public cloud file services are now being used as a mechanism to distribute malware. The report finds nearly one-third (29%)…
DEF CON 27, Packet Hacking Village – Jay Beale’s ‘Attacking And Defending Kubernetes’
Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink The post DEF CON 27, Packet Hacking Village – Jay Beale’s ‘Attacking And…
Australian Information Commissioner Holds Facebook’s Feet To The Barbie…
Image Courtesy of Wikipedia via Natasha Lomas – writing at TechCrunch, comes this story of the Australian Information Commissioner filing proceedings targeting Facebook Inc. (NASDAQ: FB) over the Cambridge Analytica data breach outrage. My take: Good on ya, Commissioner! ‘Australia’s…
March 2020 Patch Tuesday – 115 Vulns, 26 Critical, Microsoft Word and Workstation Patches
This month’s Microsoft Patch Tuesday addresses 115 vulnerabilities with 26 of them labeled as Critical. Of the 26 Critical vulns, 17 are for browser and scripting engines, 4 are for Media Foundation, 2 are for GDI+ and the remaining 3…
What’s Next in Cyber Threat Intelligence?
Video: Jake Williams (SANS & Rendition InfoSec) shares his thoughts about the future of Cyber Threat Intelligence (CTI) and OSINT collection. (Authentic8) The post What’s Next in Cyber Threat Intelligence? appeared first on Security Boulevard. Advertise on IT Security…
The Biggest Gap in Cybersecurity is Empathy
Cybersecurity vendors focus on the threat landscape and developing tools and solutions to defend against it, but the real secret to better cybersecurity is empathy–and understanding why users do what they do. The post The Biggest Gap in Cybersecurity is…
A Day in the Life of the Data-Driven CISO
The post A Day in the Life of the Data-Driven CISO appeared first on Security Boulevard. Advertise on IT Security News. Read the complete article: A Day in the Life of the Data-Driven CISO
What is the Best Way to Protect Data?
When it comes to advancements in data encryption, you can find a lot of news on quantum computing (which could easily decrypt anything encrypted), homomorphic encryption (which returns results on processing encrypted data), and honey encryption (tricking hackers into believing…
Security Validation: Addressing the Need for Change RSA 2020 Key Takeaways by Henry Peltokangas
Another year of RSA has come to a close. We reflected on the changes from 2019 to now, and it wasn’t surprising to see what was top of mind for not just the audience but also what was reflected in…
New AMD Processor Bug Breaks Encryption
AMD CPUs have yet another flaw: Researchers say they can steal private AES keys, leak kernel memory, set up covert cloud channels, and do other dirty, dark deeds. The post New AMD Processor Bug Breaks Encryption appeared first on Security Boulevard.…
DisruptOps Raises $9M Series A to Scale Cloud Security Operations
Drive Capital leads investment in DisruptOps to scale go-to-market efforts of the market-leading cloud security operations platform KANSAS CITY–March 10, 2020– DisruptOps Inc., the leader in Cloud Security Operations, has raised $9M in Series A funding from Drive Capital and…
5 Myths About DDoS in 2020
The nature of DDoS attacks is shifting, and while some organizations might believe that DDoS is a thing of the past, this is not the case. Here are the top 5 DDoS myths for 2020. The post 5 Myths About…
How should Large organisations achieve and maintain PCI compliance?
Since 2006, the PCI Security Standards Council (PCI SSC) has managed the evolution of the Payment Card Industry Data Security Standard (PCI DSS.) It does this by frequently assessing and updating the standard through collaboration with participating organisations. In order…
Resilient in Times of Disruption
Business disruptions include cyberattacks, natural disasters and outbreaks of illness and they can affect any organization ? sometimes globally, creating widespread impacts. These disruptive events spotlight critical risks we should all think about. Read on to learn about these risks…
RSA 2020 Conference Recap: 7 Conference Observations from the Floor
RSA 2020 wrapped up last week in San Francisco, and once again, the show floor was buzzing with innovation and swag. While it’s… The post RSA 2020 Conference Recap: 7 Conference Observations from the Floor appeared first on Security Boulevard.…
Why Sign in with Apple Is a Good Thing
Mobile app developers who care about security will be excited to implement Sign in with Apple and see how this balance of user experience, privacy and security will propel the industry forward. The feature isn’t just a way for Apple…
California Proposal for Mandatory Cyber Insurance
Will California’s bill to force cyber insurance be a harbinger for the rest of the U.S.? On Feb. 15, California Assemblyman Ed Chau, representing the Western San Gabriel Valley (near President Nixon’s old stomping ground of Whittier) introduced AB 2320,…
Contrast Labs: Jenkins Maven HPI Plugin Exposes Developer Laptops
As is the case with the development team at Contrast Security, many development teams develop custom Jenkins plugins. In doing so, you probably find value in the maven-hpi-plugin project. The Jenkins Maven HPI Plugin hpi:run target initializes a local Jetty…
Curricula Celebrates 5 Year Anniversary
5 years ago today on March 9, 2015, I remember waking up and having no idea what I was doing. I mean I had a broad vision of what we were building at Curricula, an education company that will change…