Category: Security Boulevard

In Case of Fire: Break Windows

When a client calls us to pentest a web application that is only available in Internet Explorer. I cringe. I don’t know if it’s flashbacks from the countless hours spent getting a website compatible with IE, or the trauma from…

Busting Top Myths About Privileged Access Management

Today, businesses everywhere are investing in infrastructure to support growth – whether that’s moving to the cloud or automating tasks and processes.  However, the newly introduced devices, application stacks and accounts that come with this… The post Busting Top Myths…

How to Whitelist Applications on Windows 10 Devices

Windows 10 devices are widely popular in enterprises as well as educational organizations. Windows Operating System still holds up the majority of the market share for desktops. Thanks to user familiarity, Windows desktops are here to stay.  As Windows 10…

The Non-Human Entities that Plague the Cloud

Entities that make cloud services work together also pose a security risk. Here are four worth considering At the average-sized company today, employees use hundreds of different cloud services. All of these apps integrate with each other using APIs, roles…

Businesses Warned of Iran Cyberattacks

Iran vowed revenge after a U.S. airstrike ordered by President Donald Trump killed the country’s top general Qasem Soleimani earlier this month. While recent missile strikes conducted by Iran against U.S. bases in Iraq was the first public move to…

macOS Catalina Patch Management

IT organizations can automate macOS Catalina patch management to streamline operations while maximizing security. Find out how to do so here. The post macOS Catalina Patch Management appeared first on JumpCloud. The post macOS Catalina Patch Management appeared first on…

Securing Interactive Kiosks IOTs with the Paradox OS

Article by Bernard Parsons, CEO, Becrypt Whether it is an EPOS system at a fast food venue or large display system at a public transport hub, interactive kiosks are becoming popular and trusted conduits for transacting valuable data with customers.…

How to Whitelist or Blacklist apps on Android & iOS

Application whitelisting or blacklisting is crucial on enterprise devices to ensure that the productive employee time is not wasted on non-work applications. As digital transformation is embraced by enterprises, by and large, having devices with unlimited access to entertainment apps…

Billions of Medical Images Leaked in Huge Privacy Puzzle

Security researchers say healthcare providers are failing to secure mind boggling amounts of highly sensitive patient medical data. The post Billions of Medical Images Leaked in Huge Privacy Puzzle appeared first on Security Boulevard.   Advertise on IT Security News. Read…

Six Reasons Why ForgeRock SDKs Make Sense

  At ForgeRock, we’re expanding the ease of use of our ForgeRock Identity Platform. Now, if you have ForgeRock Access Manager (AM), Identity Manager (IDM), and Directory Service (DS), your developers can take advantage of our new open source SDKs…

Do Midsized Companies Need a CISO?

Chief information security officer, or CISO for short—it’s a very popular title lately, being added to C-suites at companies of all sizes. It seems corporate boards feel a company isn’t considered serious if it doesn’t have a CISO or similarly…

How to Rein In Your Unmanaged Cloud in 4 Steps

The prevalence of migration to the cloud highlights the catch-22 of cybersecurity: the security vs. convenience tradeoff. But it doesn’t have to be this way. The post How to Rein In Your Unmanaged Cloud in 4 Steps appeared first on…

XKCD ‘Star Wars Voyager 1’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Star Wars Voyager 1’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD ‘Star Wars Voyager 1’

Is Google Cloud Identity Premium Right for Your Org?

Google Cloud Identity Premium extends identities used for Google services to third-party web applications. It also has some MDM features. The post Is Google Cloud Identity Premium Right for Your Org? appeared first on JumpCloud. The post Is Google Cloud…

The Marriage of Data Exfiltration and Ransomware

Ransomware and Data Exfiltration are being combined to further complicate the lives of victims. How will this new development shake out? The post The Marriage of Data Exfiltration and Ransomware appeared first on Security Boulevard.   Advertise on IT Security…

AWS Cloud Directory Pricing

As IT admins evaluate AWS Cloud Directory, pricing is a leading concern. Let’s break down their pricing model and how it compares to functionality. The post AWS Cloud Directory Pricing appeared first on JumpCloud. The post AWS Cloud Directory Pricing…

Cybersecurity Maturity Model Certification (CMMC) Levels

The CMMC model has five defined levels, each with a set of supporting practices and processes. Practices range from Level 1 (basic cyber hygiene) and to Level 5 (advance/progressive). […] The post Cybersecurity Maturity Model Certification (CMMC) Levels appeared first…

FCC Subsidized Sprint Phones Have Malware Preinstalled

The FCC is paying Sprint, in the guise of “Assurance Wireless,” to hand out Unimax Android phones infested with malware. The post FCC Subsidized Sprint Phones Have Malware Preinstalled appeared first on Security Boulevard.   Advertise on IT Security News.…

The Joy of Tech® ‘Spaceship Streaming’

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® Permalink The post The Joy of Tech® ‘Spaceship Streaming’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: The Joy of Tech® ‘Spaceship Streaming’

Encryption Will Take Center Stage in 2020

In the past, technology was a topic of discussion primarily among engineers and scientists. Debates would erupt over technology, but they were confined to esoteric conferences, labs or lecture halls. Our connected world has changed all that. Now it’s not…

Researchers Find RDP Abuse Exposes New Fileless-Type Tactic

Recent investigations by Bitdefender security researchers revealed an attack tactic that could be considered fileless, from an endpoint perspective. Abusing the RDP protocol, in the sense that attackers already have legitimate RDP (Remote Desktop Protocol) credentials, means they can set…

Encrypted Traffic Analysis Will Be Mandatory Soon

 Although today much of the internet traffic is encrypted, attackers can still exploit it. While the need to examine encrypted traffic is obvious, the way to carry out decryption often remains a conundrum. Decrypting traffic can introduce performance bottlenecks and…

Making Compliance and Risk Part of DevOps – 2020 Trend #4

In our 2020 Trends blog, Imperva CTO Kunal Anand predicts that fully automated processes will make compliance more rapid and less expensive. As businesses incorporate security into software development lifecycles (SDLC), continuous integration-continuous deployment (CICD) processes will reduce risk and…

Geopolitical Cyberstress? Doublecheck Your Basics

With tensions escalating on the global political front, organizations are concerned and wondering what–if anything–they can do to protect their networks and data from being targeted or becoming collateral damage in potential cyber attacks. The post Geopolitical Cyberstress? Doublecheck Your…

XKCD ‘Parenthetical Names’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Parenthetical Names’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD ‘Parenthetical Names’

Total Cost of Ownership of Azure AD

Many factors and additional services come into play when you calculate the total cost of ownership of Microsoft’s Azure Active Directory. The post Total Cost of Ownership of Azure AD appeared first on JumpCloud. The post Total Cost of Ownership…

Firefox Critical Zero-Day Being Exploited: Patch NOW

Mozilla’s Firefox browser has a nasty bug. Rated “critical,” the vulnerability is being actively exploited in the wild. The post Firefox Critical Zero-Day Being Exploited: Patch NOW appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete…

The Trouble with Student Data Privacy Laws

Student data privacy laws try to protect our children, but confusion still reigns School districts know that educational institutions are key targets for cybercriminals. It would help if there was a clear strategy for protecting our children. However, between the…

API Security a Top Concern for Cybersecurity in 2020

The role of the application programmable interface (API) keeps rising in prominence within the enterprise. And as that happens, so does the risk of APIs as an enterprise attack surface. According to security experts, API security will be a top…

Kick Off 2020 Securely With GravityZone™

Three Major Awards Mark A Milestone for Bitdefender’s Integrated Security Across Endpoint, Network and Cloud! From crippling ransomware attacks to a near-miss of WannaCry 2.0, 2019 has been anything but short of security incidents, with major attacks popping up in…

FastMed Improves Urgent Care And Patient Privacy with Idaptive

Idaptive was the remedy for simplifying access to healthcare apps and safeguarding against unauthorized access to patient info. For FastMed Urgent Care, speed and efficiency are about much more than creating operational excellence. It translates into prompt, personal, and high-quality…

Corporate Twisting Of Privacy Laws

Quite likely, the single most important Privacy related paper you should examine. Today’s Must Grok. Permalink The post Corporate Twisting Of Privacy Laws appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: Corporate Twisting…

Pentesting with a Raspberry Pi!

For years now I have been a huge proponent of the Raspberry Pi.  I started with a Raspberry Pi 2, which required a USB WiFi dongle for wireless, to a Raspberry Pi 3b with onboard WiFi.  Later I would get…

XKCD, Alignment Chart Alignment Chart

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD, Alignment Chart Alignment Chart appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD, Alignment Chart Alignment Chart

Are Hotel Guests Safe From a Data Breach?

The 2018 Starwood Hotels breach is only the latest in a long line of high profile intrusions that hotels have faced. It’s notable primarily for how many customer records were exposed — 500 million worldwide according to parent company Marriott…

New SHA-1 Attack

There’s a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We managed to significantly reduce the complexity of collisions…

The Year Ahead for Kubernetes and Container Security

A new study out conducted among the DevSecOps community shows that Kubernetes use is rapidly growing within the enterprise, and not just within test or development environments. As organizations try to catch their breath with the rapid adoption rate, the…

Secure Enclaves: A New Approach to Cybersecurity

Secure enclaves can help reduce data breaches dramatically and support the value of the cloud securely “The world runs on software” and “software is eating the world” are phrases you have probably heard over the years. No doubt we cannot…

Hackers Are Targeting Your Small Business

We’ve all read the headlines of cyberattacks on big businesses and government entities—hackers swiping millions of credit card details, Social Security numbers and other personal information. But have you thought about what the consequences a cyberattack against your small business…

Spoilsports: The AT&T Gambit

Well, there-they-go-again: The Spoilsports of mandated internet speeds – poo-pooing speed increases under discussion to-and-for the contemplated FCC-led Rural Digital Opportunity Fund – all in the name profits. Read it and Weep, me hearties. Today’s Must Read and a finalist…

Why 2FA SMS is a Bad Idea

Two-factor authentication (2FA) brings an extra layer of security that passwords alone can’t provide. Requiring an extra step for a user to prove their identity reduces the chance of a bad actor gaining access to data. One of the most…

Modernize Active Directory

In the modern era of mixed-platform IT environment, IT admins need more from the services Active Directory offers. It’s time to modernize AD. The post Modernize Active Directory appeared first on JumpCloud. The post Modernize Active Directory appeared first on…

Hacking the Hackers: Adversarial AI and How to Fight It

Advances in Artificial Intelligence (AI) have led to smarter, more robust network security platforms that are quickly replacing legacy security solutions. The post Hacking the Hackers: Adversarial AI and How to Fight It appeared first on Security Boulevard.   Advertise…

6 Things Every Big Data Security Solution Needs

As data-centric security gain mainstream recognition for its ability to protect sensitive data from theft and malicious use, enterprises are faced with choosing a solution from an increasing array of options. However, not all solutions that claim to be data-centric…

The Perfect Phishing Email

Thinking like the bad guys is part of being in cybersecurity. Our ability to anticipate the moves of our opponents is essential, just like in a chess game – except with real business consequences. Drawing on my prediction of worse…

Collaboration Under PDGM

The new year means the roll out of Patient-Driven Groupings Model (PDGM). It’s the biggest change in Medicare’s payment methodology for home healthcare since the home health Prospective Payment System (PPS) was implemented and, like PPS, means that providers have…

How Cryptocurrency Could Benefit You

The post How Cryptocurrency Could Benefit You appeared first on CCSI. The post How Cryptocurrency Could Benefit You appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: How Cryptocurrency Could Benefit You

A Quick Guide to SD-WAN Security

Today, nearly every IT decision-maker wants to invest in innovation that will facilitate network performance and agility without compromising security. For many, the answer is SD-WAN. The intersection between security and SD-WAN is critical in keeping data not only accessible…

Adding MFA to Windows Systems

The password is the top target for attackers, so adding MFA to Windows systems is one of the most important security measures. The post Adding MFA to Windows Systems appeared first on JumpCloud. The post Adding MFA to Windows Systems…

London Stock Exchange Outage: A Cyberattack? By Iran?

Secret sources say stock exchange failure might have been caused by a security breach. GCHQ, the “Brisish NSA” are said to be investigating a possible inside job, involving a bogus software update. The post London Stock Exchange Outage: A Cyberattack? By…

XKCD, ‘OK/okay/ok’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD, ‘OK/okay/ok’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD, ‘OK/okay/ok’

Benefits of Automation: Make the Most of Your People

Gone are the days when IT leaders fretted that the benefits of automation would shove people out of jobs. If anything, it’s the opposite: 74% of cybersecurity professionals say that a skills shortage has affected their organizations, continuing a trend…

JumpCloud’s Top 10 Blogs of 2019

As we greet this new decade with fresh goals and holiday leftovers, let’s reflect on the blogs that readers found […] The post JumpCloud’s Top 10 Blogs of 2019 appeared first on JumpCloud. The post JumpCloud’s Top 10 Blogs of…