Tag: Security Boulevard

Behavioral Baselining and its Critical Role in Cybersecurity

Defining “normal” and taking the first step in next-gen threat detection Organizations face an increasing array of threats, from sophisticated malware to insider threats. Behavioral baselining helps companies safeguard sensitive data and maintain robust security postures by clearly defining what…

Google Expands Chrome Security and Privacy Capabilities

Google over the past week has taken numerous steps to better Chrome users, including taking new steps toward reducing the use of passwords for authentication and hardening its post-quantum encryption. The post Google Expands Chrome Security and Privacy Capabilities appeared…

Simplify NIS2 compliance with Sonatype

If you provide software or software services in the European Union (EU), you are no doubt aware of several key pieces of legislation being implemented to enhance cybersecurity for critical industries. The Network and Information Systems Directive 2 (NIS2) is…

Companies Often Pay Ransomware Attackers Multiple Times

Nearly a third of companies hit by ransomware attacks paid ransoms four or more times in the past year, according to the Semperis 2024 Ransomware Risk report. The post Companies Often Pay Ransomware Attackers Multiple Times appeared first on Security…

AI Could Help Resolve IT/OT Integration Security Challenges

Security issues stemming from the integration of information technology (IT) and operational technology (OT), could be addressed through artificial intelligence (AI), although the technology could also be leveraged by malicious actors, according to a Cisco study. The post AI Could…

More Than Two Million Stolen VPN Passwords Discovered

More than 2.1 million stolen VPN passwords have been compromised by malware in the past year, highlighting a growing risk for unauthorized access to secure networks, according to a Specops Software report. The post More Than Two Million Stolen VPN…

Exploding pagers and the new face of asset-centric warfare

Attacks on critical infrastructure  The explosion of the Soviet gas pipeline in 1982 was one of the first well-known instances of critical infrastructure being targeted through a software modification that contained a hidden malfunction. In this instance, the Soviets were…

Sonatype can help you navigate DORA compliance

Providers of digital products and services to the EU are being impacted by a suite of new cybersecurity regulations coming into force. Among them is the Digital Operations Resilience Act (DORA), and we’ve developed a checklist to help you manage…

Century-Long Innovation: A Legacy of Outpacing Cyber Threats

Discover how Komori, a century-old printing giant, is leading the charge in cybersecurity innovation by adapting to internet-connected risks and utilizing advanced solutions like NodeZero to safeguard their legacy. The post Century-Long Innovation: A Legacy of Outpacing Cyber Threats appeared…

What is the KEV Catalog?

A quick guide to the Known Exploited Vulnerabilities (KEV) catalog. The post What is the KEV Catalog? appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: What is the KEV Catalog?

The EU AI Act and the Need for Data-Centric Security

Artificial intelligence (AI) is already embedded deep into the economic and social fabric of the world. It does everything from operating website chatbots to authenticating users with their bank. It keeps planes in the sky and cars on the road.…

International Raids Shut Down Ghost Encrypted Messaging App

Europol headed up an international law enforcement operation against the operators and users of Ghost, an encrypted messaging app that was used by criminal organizations worldwide for drug trafficking, money laundering, and threating to kill or harm people. The post…

Rethinking TPRM: Managing Third-Party SaaS Risks | Grip

Discover how to close the gaps in TPRM with better third-party risk management. Learn how Grip and SecurityScorecard protect against hidden shadow SaaS risks. The post Rethinking TPRM: Managing Third-Party SaaS Risks | Grip appeared first on Security Boulevard. This…