Tag: Security Boulevard

Randall Munroe’s XKCD ‘Exponential Growth’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2936/” rel=”noopener” target=”_blank”> <img alt=”” height=”264″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/9b04d268-8308-4d15-8d0c-220287263d87/exponential_growth.png?format=1000w” width=”545″ /> </a><figcaption class=”image-caption-wrapper”> via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Exponential Growth’ appeared first on Security…

The WAF Oath: Primum Non Nocere | Impart Security

Impart Security’s Director of Field Engineering, Jack Zarris, dives into the evolution of Web Application Firewalls from first generation RegEx tuning to next-generation threshold tuning of false positives and finally the current state of self-tuning and why runtime API security…

Hospitals Hacked: Urgent Care Needed

In recent research by Veriti, a significant cyber security breach at Change Healthcare highlighted severe vulnerabilities in healthcare data security, affecting over 1.35 million files. This breach involved multiple healthcare and insurance providers, exposing sensitive data like medical records and…

Human Error and AI Emerge as Key Challenges in Survey of CISOs

The 2024 Proofpoint “Voice of the CISO” report is a useful barometer for understanding the current cybersecurity landscape, providing valuable insights from 1,600 CISOs globally. This year’s findings reveal a complex picture where heightened concerns coexist with a growing sense…

BTS #30 – Systems Of Trust – Robert Martin

Bob Martin comes on the show to discuss systems of trust, supply chain security and more! Show Notes The post BTS #30 – Systems Of Trust – Robert Martin appeared first on Eclypsium | Supply Chain Security for the Modern…

Prompt Injection Threats Highlight GenAI Risks

88% of participants in the Immersive “Prompt Injection Challenge” successfully tricked a GenAI bot into divulging sensitive information. The post Prompt Injection Threats Highlight GenAI Risks appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Security Compliance 101: What It Is and How to Master It

Talk to any compliance officer today, and they will all agree that modern security compliance — fulfilling your organization’s regulatory obligations to keep data safe, secure, and intact — must be a top priority for every business. But what, exactly,…

Ransomware, BEC, GenAI Raise Security Challenges

According to a global Arctic Wolf survey of over 1,000 senior IT and cybersecurity decision-makers, seven in 10 organizations were targeted by BEC attacks in the past year. The post Ransomware, BEC, GenAI Raise Security Challenges appeared first on Security…

CFO Deepfake Redux — Arup Lost $26M via Video

Deepfake Zoom of Doom: Construction giant Arup Group revealed as victim of January theft—10% of net profit lost. The post CFO Deepfake Redux — Arup Lost $26M via Video appeared first on Security Boulevard. This article has been indexed from…

What You Need to Know About SEC Compliance Requirements

Catch up on the latest SEC compliance guidance and learn how risk-based vulnerability management can help you align to reporting requirements. The post What You Need to Know About SEC Compliance Requirements appeared first on Security Boulevard. This article has…

USENIX Security ’23 – USENIX Security ’23 – Content-Type: multipart/oracle – Tapping into Format Oracles in Email End-to-End Encryption

Authors/Presenters: Fabian Ising, Damian Poddebniak and Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at…

Bridging the NHI security gap: Astrix and Torq partner up

While zero-trust policies and identity-centric programs excel at protecting user identities and login credentials with IAM policies and security tools like MFA or IP restrictions, non-human identities (NHIs) like API keys, OAuth apps, service accounts, and secrets often lack visibility,…

Hackers Leverage AI as Application Security Threats Mount

Reverse-engineering tools, rising jailbreaking activities, and the surging use of AI and ML to enhance malware development were among the worrying trends in a recent report. AI and ML are making life easier for developers. They’re also making life easier…