In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various…
Category: Security Boulevard
DEF CON 32 – Recon Village – Recon MindMap: Organize, Visualize & Prioritize Recon Data
Speaker: Lenin Alevski Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The…
How can I monitor NHI activities within my IAM system?
Is Monitoring Non-Human Identities (NHIs) in Your IAM System Crucial? Ensuring the security of your data and systems is a top priority for all organizations operating. One of the key players in this arena that often goes unnoticed is Non-Human…
What solutions offer centralized management for NHIs within IAM?
Are Centralized Management Solutions the Key to Mastering Non-Human Identities Within IAM? For enterprises operating, managing Non-Human Identities (NHIs) within Identity and Access Management (IAM) remains a critical requirement. But how can organizations keep pace with the sheer volume of…
CVE-2025-24813: Apache Tomcat Vulnerable to RCE Attacks
IntroductionCVE-2025-24813 was originally published on March 10 with a medium severity score of 5.5, and Apache Tomcat released an update to fix it. On March 12, the first attack was detected in Poland by Wallarm researchers, even before a Proof-of-Concept…
HIPAA Security Rule Amendment: Key Public Comments and Next Steps
Major cybersecurity breaches continue to plague the US healthcare industry, and on December 27, 2024, the U.S. Department of Health and Human Services (HHS) issued a Notice of Proposed Rulemaking (NPRM) to amend the HIPAA Security Rule, titled “The HIPAA…
How can legacy IAM systems be updated to support NHIs?
Could Your Legacy IAM Be The Achilles Heel of Your Cybersecurity? When security breaches and data leaks proliferate, organizations grapple with the rising challenge of protecting their digital assets. This is particularly true for organizations with legacy Identity and Access…
What role do NHIs play in modern identity and access management?
How Vital is the Role of Non-Human Identities in Identity and Access Management (IAM)? Have you ever wondered how digital machinery and applications gain access to our systems? The answer lies in Non-Human Identities (NHIs), a critical, yet often overlooked…
How do I ensure secure authentication for NHIs in an IAM system?
Is Your IAM System Adequately Protecting Non-Human Identities? Non-Human Identities (NHIs) are one such intricacy that has increasingly made its way into IAM (Identity Access Management) systems. However, the question remains: How do we ensure secure authentication for NHIs in…
DEF CON 32 – Recon Village – Pushing the Limits of Mass DNS Scanning
Speaker: Jasper Insinger Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite []DEF CON 32]2 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The…
Securing Your Supply Chain from Phishing Attacks
In this piece, Tass Kalfoglou, the director of our APAC Business Unit, sheds light on supply chain vulnerabilities and the need to level up domain security. The post Securing Your Supply Chain from Phishing Attacks appeared first on Security Boulevard.…
Ex-Michigan, Ravens Football Coach Charged with Hacking Athlete Accounts
Matthew Weiss, former football coach for the University of Michigan and the Baltimore Ravens, for almost 10 years accessed the social media and other online accounts of thousands of student athletes and downloaded personal information and intimate images, said prosecutors…
Fifth Circuit Strikes Down “Geofence” Warrants – Conflict With Fourth Circuit
Geofence warrants are a relatively new tool that allows law enforcement to obtain location data from devices within a specified geographic area during a specific time frame. The post Fifth Circuit Strikes Down “Geofence” Warrants – Conflict With Fourth Circuit…
Importance of Regular Network Security Audit
A network is simply a way for devices like computers, phones, or servers to connect and communicate with each other. It is similar to a road system that allows cars to travel between different places. If we take the cars…
Report Surfaces Sharp Increase in Cyberattacks Aimed at Applications
An analysis of cyberattacks made against applications published this week by Digital.ai, a provider of a platform for securely delivering software, finds a 20% year over year increase, with 83% of applications tracked in January now under constant cyberattack compared…
AI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report
Artificial intelligence (AI) has rapidly shifted from buzz to business necessity over the past year—something Zscaler has seen firsthand while pioneering AI-powered solutions and tracking enterprise AI/ML activity in the world’s largest security cloud.As enterprises embrace AI to boost productivity,…
Frost & Sullivan Report: Independent Security Efficacy Testing of Cato SASE Platform Using SafeBreach
See how independent analyst firm Frost & Sullivan used the SafeBreach exposure validation platform to test the efficacy of the Cato SASE Cloud Platform. The post Frost & Sullivan Report: Independent Security Efficacy Testing of Cato SASE Platform Using SafeBreach…
Report: More Attacks Aimed at Android Devices Configured with Root Access
A report published today by Zimperium, a provider of a platform for securing mobile devices and applications, today finds devices running the Android operating system that have enabled root-level privileges are 3.5 times more likely to be attacked, resulting in…
Effective Bot Management and E-Commerce Security: Protecting Retailers from Online Fraud
E-commerce thrives on real customer engagement, yet malicious bots regularly threaten to disrupt this digital ecosystem. To combat these ever-evolving attacks, retail businesses must implement modern bot management. Bot management refers to the deployment of security measures to detect, mitigate,…
CISO survey: 6 lessons to boost third-party cyber-risk management
Third-party cybersecurity incidents are on the rise, but organizations face challenges in mitigating risks arising for the software supply chain, a survey of 200 chief information security officers (CISOs) has found. The post CISO survey: 6 lessons to boost third-party cyber-risk…