Tag: Security Boulevard

Q1 2024: A Wake-up Call for Insider Threats

The first quarter of 2024 painted a concerning picture of security threats for enterprise organizations: information leaks and breaches exposed sensitive data across major corporations. The post Q1 2024: A Wake-up Call for Insider Threats appeared first on Security Boulevard.…

Tile/Life360 Breach: ‘Millions’ of Users’ Data at Risk

Location tracking service leaks PII, because—incompetence? Seems almost TOO easy. The post Tile/Life360 Breach: ‘Millions’ of Users’ Data at Risk appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Tile/Life360 Breach: ‘Millions’…

Eclypsium Joins the Joint Cyber Defense Collaborative

Eclypsium becomes a member of CISA’s public-private partnership for cyber defense strategy Portland, OR – June 13, 2024 – Eclypsium, the digital supply chain security company protecting critical hardware, firmware, and software, today announced it has become a member of…

Connecticut Has Highest Rate of Health Care Data Breaches: Study

It’s no secret that hospitals and other health care organizations are among the top targets for cybercriminals. The ransomware attacks this year on UnitedHealth Group’s Change Healthcare subsidiary, nonprofit organization Ascension, and most recently the National Health Service in England…

Strength in Unity: The Power of Cybersecurity Partnerships

In a recent conversation with Iren Reznikov, we discussed into the intricacies of aligning investment decisions with broader business goals and the pivotal role cybersecurity partnerships play in driving industry-wide innovation. I recently had the opportunity of sitting down with…

Elevating SaaS App Security in an AI-Driven Era

In the rapidly evolving landscape of software as a service (SaaS), the security of applications has never been more critical. The post Elevating SaaS App Security in an AI-Driven Era appeared first on Security Boulevard. This article has been indexed…

What is Continuous Authority to Operate (cATO)?

Continuous Authority to Operate (cATO) is a dynamic and ongoing process for maintaining the authorization to operate IT systems within a federal agency. Unlike traditional ATO processes, cATO involves continuous monitoring and assessment of security controls to ensure compliance. Qmulos…

What is ISO 27001 Compliance?

ISO 27001 compliance involves adhering to the international standard for information security management systems (ISMS). This standard provides a systematic approach to managing sensitive information and ensuring data security. Qmulos’ platform supports ISO 27001 compliance by automating the processes required…

Financial Institutions Must Reexamine Their Technology Setup

In today’s fast-evolving financial landscape where customer expectations and technological advancements are constantly shifting, financial… The post Financial Institutions Must Reexamine Their Technology Setup appeared first on Entrust Blog. The post Financial Institutions Must Reexamine Their Technology Setup appeared first…