Author/Presenter:Liam Follin Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 – Purple Track – Tales Of DOMinica…
Category: Security Boulevard
Data-Driven Analysis With a Managed CRQ Platform | Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Data-Driven Analysis With a Managed CRQ Platform | Kovrr appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…
BSides Exeter 2024 – Purple Track – Panel: Mythbusting The Silver Bullet
Authors/Presenters: Panel Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 – Purple Track – Panel: Mythbusting The…
Microsoft: Massive Malvertising Campaign Infects a Million Devices
A massive malvertising campaign that targeted individuals watching pirated videos on illegal streaming sites redirected them several times before landing them at GitHub repositories that hosted infostealers and other malware, according to Microsoft The post Microsoft: Massive Malvertising Campaign Infects…
The Buddy System: Why Google is Finally Killing SMS Authentication
Like the Buddy System in The Simpsons, SMS authentication was only foolproof if everything went right. But when both “buddies” could be compromised at the same time, the entire system was doomed to fail. The post The Buddy System: Why…
Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes
In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss…
GUEST ESSAY: Four essential strategies to bolster cyber resilience in critical infrastructure
In 2023, victims reported nearly 900,000 cybercrime complaints to the FBI. Altogether, losses eclipsed $12.5 billion — a significant 22% increase from the losses in 2022. Related: Closing the resiliency gap Unsurprisingly, experts predict this trend will continue to grow…
What are the cost implications of advanced NHI protection?
What is the True Cost of Not Investing in Non-Human Identities Protection? Non-Human Identities (NHIs) are increasingly significant where automated operations and cloud-based infrastructures dominate. But what happens when businesses overlook the value of advanced NHI protection? What are the…
How do I measure the effectiveness of our NHI security measures?
A Perplexing Dilemma or a Solvable Query? Have you ever puzzled over how to measure the effectiveness of Non-Human Identities (NHIs) security in your organization? You understand the importance of NHIs. But quantifying their security effectiveness remains crucial yet challenging.…
BSides Exeter 2024 – Keynote: Matt Broomhall & Richard DeVere
Authors/Presenters: Matt Broomhall & Richard DeVere Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 – Keynote: Matt…
How can NHI risks be reduced without compromising system performance?
Are your Non-Human Identities (NHIs) and Secrets effectively managed? NHIs and Secrets have emerged as crucial elements. However, the question looms: are these entities being effectively managed to reduce risks without compromising system performance? Understanding the Critical Role of NHIs…
BSides Exeter 2024 – Keynote: Flushing Away Preconceptions Of Risk
Author/Presenter: Thom Langford Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 – Keynote: Flushing Away Preconceptions Of…
What are the best governance practices for managing NHIs?
What Drives the Need for Effective Non-Human Identities (NHIs) Governance Practices? Are we really addressing the potential dangers that lurk behind poorly managed non-human identities (NHIs)? With a sharp increase in the interconnectedness of modern systems, the importance of proper…
How can NHIs affect our overall threat landscape?
Are We Overlooking Non-Human Identities in Our Cybersecurity Strategy? How often do we give due consideration to the Non-Human Identities (NHIs)? The role of NHIs and their ‘secrets’ management in creating a robust and secure IT infrastructure is often underestimated.…
How do I prioritize NHI risks in boardroom discussions?
Why is Risk Prioritization of Non-Human Identities Essential in Boardroom Discussions? Cybersecurity continues to command greater attention in organizational hierarchies, understanding the significance of Non-Human Identities (NHIs) risk prioritization becomes crucial. NHIs, defined as machine identities used in cybersecurity, provide…
MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark Compliance Summit
Go inside the landmark Kaseya Compliance Summit, a unique event featuring industry experts focused on compliance challenges and opportunities for small business. The post MSPs, IT Pros & Compliance Leaders Unite at Kaseya’s Landmark Compliance Summit appeared first on Kaseya.…
BSides Exeter 2024 – Keynote: Become A Better Security Engineer (By Not Doing Security)
Author/Presenter: Kane Narraway Our thanks to Bsides Exeter, and the Presenters/Authors for publishing their timely Bsides Exeter Conference content. All brought to you via the organizations YouTube channel. Permalink The post BSides Exeter 2024 – Keynote: Become A Better Security…
‘Ban These Chinese Routers NOW,’ Cries House Committee
Sino stoppage scheme: TP-Link in crosshairs, along with other brands. The post ‘Ban These Chinese Routers NOW,’ Cries House Committee appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: ‘Ban These Chinese…
Compensating Controls, Customized Approach and Tokenization in PCI DSS 4.0
The Payment Card Industry Data Security Standard (PCI DSS) has always been considered one of the most prescriptive industry mandates around. And well might it be, given what’s at stake. As breach volumes surge and threat actors find it ever…
The Evolution of Single Sign-On for Autonomous AI Agents: Securing Non-Human Identities in the Age of Agentic Automation
Explore the evolution of Single Sign-On for autonomous AI agents, focusing on securing non-human identities and the future of agentic automation security. The post The Evolution of Single Sign-On for Autonomous AI Agents: Securing Non-Human Identities in the Age of…