While many organizations devote countless resources to stopping attacks at the perimeter, today’s threat landscape calls for a different mindset. The concept of breach readiness begins with acknowledging the likelihood of an incident, then building robust methods to contain and…
Tag: Security Boulevard
Botnet Threat Update July to December 2024
Overall botnet command control (C&C) activity decreased marginally by -4% between July and December last year. China dominated the Top 20 charts with increased botnet C&C activity across domain registrars and networks, ranking #1 globally for hosting botnet C&C servers.…
Privacy Roundup: Week 2 of Year 2025
This is a news item roundup of privacy or privacy-related news items for 5 JAN 2025 – 11 JAN 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here…
How to Capitalize on 5 Trends Shaping the Future of Pentesting
Continuous testing is a major contributor to cybersecurity that’s so advanced, integrated and proactive that it doesn’t just prevent an attack but wards off attackers altogether. The post How to Capitalize on 5 Trends Shaping the Future of Pentesting appeared…
How Your Digital Footprint Fuels Cyberattacks — and What to Do About It
Where you live, where you jog, what your pet’s name is and which email address you use the most is no longer a secret to cybercriminals. Hackers are exploiting the digital breadcrumbs — your personally identifiable information (PII) — that…
AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude
Do you ever read the privacy policy of your favorite AI tools like ChatGPT, Gemini, or Claude? In this episode, Scott Wright and Tom Eston discuss the critical aspects of these policies, comparing how each AI engine handles your personal…
The Vanity Press in Academia
I’ve never been a regular resident of the ivory halls of academia, but Mich Kabay recently made me aware of an article about legitimate scientific journals driven to distraction by being flooded with commentary apparently reflecting a surge in the…
DEF CON 32 – Open Source Hacker V. Government Lawyer
Authors/Presenters: Rebecca Lively, Eddie Zaneski Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.…
What is PCI DSS 4.0: Is This Still Applicable For 2024?
In a time when cyber threats continuously evolve, a security standard or framework is essential for protecting digital assets. The Payment Card Industry Data Security Standard (PCI DSS), developed by the PCI Security Standards Council, empowers organisations to safeguard cardholder…
PCI DSS Requirements With v4.0.1 Updates For 2024
PCI DSS refers to the Payment Card Industry Data Security Standard created by the PCI Security Standards Council (PCI SSC), an independent entity founded by major payment card brands, including Visa, JCB International, MasterCard, American Express, and Discover. PCI DSS…
Advancements in Machine Identity Protections
The Strategic Importance of Non-Human Identities Are we taking the necessary steps to secure our machine identities, or are we leaving our systems exposed to potential attackers? Non-Human Identities (NHIs) play a critical role in maintaining secure cloud environments. In…
DEF CON 32 – Porn & Privacy – ET
Author/Presenter: ET Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The post…
2025 SaaS Security Word of the Year: Adaptability | Grip
Discover why adaptability is the 2025 SaaS security word of the year. This is the year to address shadow SaaS, AI risks, and evolving cyber threats effectively! The post 2025 SaaS Security Word of the Year: Adaptability | Grip appeared…
The Cost of Complacency in Credential Hygiene
The PowerSchool breach highlights the risks of poor credential hygiene. This article covers proactive steps to protect your SaaS environment. The post The Cost of Complacency in Credential Hygiene appeared first on Security Boulevard. This article has been indexed from…
Below the Surface Winter 2024 Edition – The Year in Review
The Year of the Typhoon Highlights from this edition: The post Below the Surface Winter 2024 Edition – The Year in Review appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise. The post Below the Surface Winter…
New Paper: “Future of SOC: Transform the ‘How’” (Paper 5)
After a long, long, long writing effort … eh … break, we are ready with our 5th Deloitte and Google Cloud Future of the SOC paper “Future of SOC: Transform the ‘How’.” As a reminder (and I promise you do need it; it…
Hackers Attack PowerSchool, Expose K-12 Teacher and Student Data
Giant education software provider PowerSchool reported that hackers using compromised credentials access a database and stole student and teacher data in an attack that the company said was not ransomware, though a ransom apparently was paid. Affected K-12 school districts…
SonarQube for IDE: Our journey this year, and sneak peek into 2025
Reviewing the enhancements delivered by the SonarQube for IDE team for developers during 2024. Focusing on streamlining the UX for teams, harnessing the power of SonarQube Server and Cloud through connected mode into your IDE, and making it even easier…
Phishing Threats, GenAI Among Top Cybersecurity Risks in 2025
Organizations are facing escalating threats from phishing attacks, personal app usage and the widespread adoption of generative AI (GenAI) in workplaces. According to a Netskope report, phishing attacks surged in 2024, with enterprise employees clicking on phishing links at a…
From Cybersecurity Consolidation to GenAI and Innovation – What to Expect: 2025 Predictions
What to expect in 2025 and beyond, into the future. Here are some likely predictions across cybersecurity, GenAI and innovation, and defensive cyber. The post From Cybersecurity Consolidation to GenAI and Innovation – What to Expect: 2025 Predictions appeared first…