Tag: Security Boulevard

The Role of Secrets Management in Securing Financial Services

The Role of Secrets Management in Securing Financial Services madhav Tue, 11/05/2024 – 04:30 < div> Secrets management is one of the top DevOps challenges. According to 2024 Thales Global Data Threat Report: Financial Services, FinServ organizations face greater security…

Hackers Exploit DocuSign APIs for Phishing Campaign

Cybercriminals are exploiting DocuSign’s APIs to send highly authentic-looking fake invoices, while DocuSign’s forums have reported a rise in such fraudulent campaigns in recent months. Unlike typical phishing scams that rely on spoofed emails and malicious links, these attacks use…

What is a Cyber Range?

Today, we’re diving into the fascinating world of cyber ranges—a critical component in the ever-evolving landscape of cybersecurity. But what exactly is a cyber range? Let’s break it down. What is a Cyber Range? A cyber range is a sophisticated…

FIDO: Consumers are Adopting Passkeys for Authentication

The FIDO Alliance found in a survey that as consumers become more familiar with passkeys, they are adopting the technology as a more secure alternative to passwords to authenticate their identities online. The post FIDO: Consumers are Adopting Passkeys for…

DEF CON 32 – OH MY DC Abusing OIDC All The Way To Your Cloud

Authors/Presenters: Aviad Hahami Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The…

Randall Munroe’s XKCD ‘Disposal’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/3005/” rel=”noopener” target=”_blank”> <img alt=”” height=”331″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/d08e3525-7eec-467f-99e2-c5e258162ff6/disposal.png?format=1000w” width=”740″ /> </a><figcaption class=”image-caption-wrapper”> via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Disposal’ appeared first on Security Boulevard.…

Wild, Weird, and Secure: SecureWV 2024’s Cryptid-Themed Conference

Discover how SecureWV 2024 combined local folklore with cutting-edge security insights, featuring talks on threat modeling, defense strategies, and team collaboration. The post Wild, Weird, and Secure: SecureWV 2024’s Cryptid-Themed Conference appeared first on Security Boulevard. This article has been…

Top Traceable API Security Alternative: Escape vs. Traceable

Learn why Escape’s agentless discovery and developer-friendly testing make it a top Traceable alternative. The post Top Traceable API Security Alternative: Escape vs. Traceable appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

What is Enterprise Compliance and Why is It Important?

In today’s fast-paced business world, companies juggle numerous responsibilities—from meeting customer demands to navigating complex regulations. One crucial area that’s often misunderstood but incredibly important is enterprise compliance.  What exactly is enterprise compliance, and why should it matter to you?…

DEF CON 32 – Where’s The Money-Defeating ATM Disk Encryption

Authors/Presenters: Matt Burch Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink The…

How Can FSOs Help with CMMC Compliance?

As of now, the final rule for the Cybersecurity Maturity Model Certification has been published. The clock is ticking for organizations to make the changes they need to make, adhere to the multi-phase schedule required to achieve certification, and continue…

IoT Security Failures Can Be Sh*tty

It’s hard not to see IoT security failures in the news because they can be dramatic, and this week was no different.  The Register reported that in Moscow a skyscraper-high plume of sewage had erupted, with speculation that Ukrainian hackers…

DEF CON 32 – Welcome to DEF CON 32

Authors/Presenters: The Dark Tangent Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink…