A healthy approach to GenAI is one in which organizations build security protections from the start. Here are tips on how to integrate security into your organization’s GenAI strategy from day zero. The post Why and How to Secure GenAI…
Tag: Security Boulevard
Frustration Trying to Opt-Out After the National Public Data Breach
The National Public Data breach has been a nightmare, exposing names, addresses, birthdates, emails, phone numbers, and Social Security Numbers of countless individuals — including mine. As a California resident, I have the legal right to demand that they delete my…
Is Cloud Security Ready for a Pivot to Behavioral Detection & Response
The inherent limitations of signature-based approaches have often driven practitioners and vendors to shift toward behavioral methods. The post Is Cloud Security Ready for a Pivot to Behavioral Detection & Response appeared first on Security Boulevard. This article has been…
Overcoming the Challenges of Zero-Trust
Zero-trust, rooted in the principle of “never trust, always verify,” requires organizations to assume that every access request, whether internal or external, is potentially harmful. The post Overcoming the Challenges of Zero-Trust appeared first on Security Boulevard. This article has…
Why Are Organizations Losing the Ransomware Battle?
Axio Senior Cybersecurity Advisor, Richard Caralli’s recent article in Dark Reading, Why Are Organizations Losing the Ransomware Battle? examines the growing problem of ransomware attacks, emphasizing that many organizations are Read More The post Why Are Organizations Losing the Ransomware…
Understanding Quantum Threats and How to Secure Data with Post-Quantum Cryptography
Post-Quantum Cryptography (PQC) is a new generation of encryption algorithms for protecting data against powerful quantum computers. Quantum computers use quantum mechanics to solve complex problems much faster than traditional computers. With rapid advancements in quantum computing, current encryption algorithms…
Randall Munroe’s XKCD ‘Lava Lakes’
<img alt=”” height=”272″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/5809f07f-b360-4679-a97e-feca717b5905/lava_lakes.png?format=1000w” width=”709″ /><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Lava Lakes’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Managing Certificate Chaos After Google’s Entrust Distrust
When Google decided to stop trusting new TLS certificates from Entrust, it didn’t just create a technical challenge—it unleashed an operational crisis for many organizations. If your business uses Entrust TLS certificates, you are facing one of two realities right…
An Introduction to Trackers and the Data They Collect
Trackers are everywhere and come in many different forms. Some tracking methods are more invasive than others; this post aims to explain what “trackers” are, how they work, and give examples of the data they collect. TABLE OF CONTENTS A…
USENIX Security ’23 – UnGANable: Defending Against GAN-based Face Manipulation
Authors/Presenters:Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at…
BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar
IntroductionIn June 2024, Zscaler ThreatLabz detected fresh activity from BlindEagle, an advanced persistent threat (APT) actor also identified as AguilaCiega, APT-C-36, and APT-Q-98. BlindEagle predominantly focuses on organizations and individuals from the government and finance sector in South America, particularly…
How StorageGuard Can Assist With CISA’s Advised Mitigations For Newly Emerged BlackSuit Ransomware
In August, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) issued a joint alert about the emergence of BlackSuit ransomware, The post How StorageGuard Can Assist With CISA’s Advised Mitigations For Newly Emerged BlackSuit…
Storage & Data Protection Trends & Innovations To Watch in 2025
It’s all about the data. One thing is clear. The “business value” of data continues to grow, making it an organization’s primary piece of intellectual property. And from The post Storage & Data Protection Trends & Innovations To Watch in 2025 appeared…
The Deception Game: How Cyber Scams Manipulate Trust to Access Sensitive Information
In recent years, the landscape of cyber scams has evolved, targeting even the tools designed to protect consumers. One such concerning development involves the exploitation of trusted services to mislead and scam users. This article explores a specific case in…
Choosing the Best Cybersecurity Prioritization Method for Your Organization
Threat monitoring and detection, such as Network Detection and Response (NDR), provide a complement to enhance a threat exposure management strategy. The post Choosing the Best Cybersecurity Prioritization Method for Your Organization appeared first on Security Boulevard. This article has…
RansomHub Emerges in Rapidly Evolving Ransomware Landscape
The ransomware space is becoming increasingly fragmented in the wake of law enforcement actions against BlackCat, LockBit, and others, spawning more threat groups and giving rise to prolific newcomers like RansomHub, according to a report by Searchlight Cyber. The post…
Pool Your Cybersecurity Resources to Build the Perfect Security Ecosystem
Cybersecurity has never been something to set once and leave running in the background — it is a constantly evolving landscape. While the migration of data and applications to the cloud provides numerous business benefits, many organizations struggle to secure…
Cloud Access Security Brokers (CASBs): Are They Still Relevant?
Understanding how CASBs are developed and how to use them effectively can assist them in safeguarding their cloud-based assets against evolving threats. The post Cloud Access Security Brokers (CASBs): Are They Still Relevant? appeared first on Security Boulevard. This article…
A Powerful Approach to SaaS ITDR – Avoiding False Positives on Improbable Travel
In the world of SaaS ITDR, the journey taken matters. There are solutions that began from an ITDR perspective. They built threat-hunting capabilities to parse through any data set, look for anomalies, and flag any activity that looks suspicious. It’s…
News alert: Blackwired launches ‘ThirdWatch?’ — an advanced third-party risk management platform
Singapore, Sept. 4, 2024, CyberNewsWire — Blackwired, the leading cyber observatory for disruptive cybersecurity technologies, has announced the launch of ThirdWatch?, a groundbreaking solution to identify direct threats facing an organization and its Third Parties. ThirdWatch? is a subject-directed ……