RansomHub, which has become among the most prolific ransomware groups over the past few months, likely got its start with the source code from the Knight malware and a boost from a one-time BlackCat affiliate. The post RansomHub Rides High…
Tag: Security Boulevard
CEO Corner: Preparing for the Unavoidable – Why Incident Response Readiness is Non-Negotiable
Twenty years ago, I began my career in information security. It was all about firewalls (the heyday of Checkpoint), content filtering (remember Bluecoat) and anti-virus (Symantec and McAfee were the name of the game). We were monitoring our network with…
USENIX Security ’23 – HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs
Authors/Presenters:Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events…
How Poor Cryptographic Practices Endanger Banking Software Security
In today’s digital age, financial institutions rely heavily on encryption to protect sensitive data in their banking applications. However, despite the critical role of cryptography, many implementations suffer from fundamental flaws that create a false sense of security. Misconceptions about…
Why Digital Threats are the New Frontier in Executive Protection
The landscape of threats facing executives has expanded far beyond the physical realm, and home is the new attack surface. Traditional security measures, while still essential, are no longer sufficient on their own to protect high-profile individuals from the myriad…
MSPs Look to Streamline Cybersecurity Partnerships, Skills Shortage Persists
A rising volume of risks, shortage of qualified cybersecurity professionals and time management with vendors are among the challenges MSPs face. The post MSPs Look to Streamline Cybersecurity Partnerships, Skills Shortage Persists appeared first on Security Boulevard. This article has…
Certificate Lifecycle Management The Key to Robust Digital Security in Healthcare
The need for robust digital security has never been more critical. As cyber threats become increasingly sophisticated, managing digital certificates effectively is paramount for protecting sensitive information and ensuring seamless operations. The post Certificate Lifecycle Management The Key to Robust…
8 Takeaways from Apple 2023 Threat Research
The newly-released Apple cybersecurity threat study reveals interesting data points and demonstrates how the threat landscape is evolving. The post 8 Takeaways from Apple 2023 Threat Research appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
SecOps Teams Shift Strategy as AI-Powered Threats, Deepfakes Evolve
An escalation in AI-based attacks requires security operations leaders to change cybersecurity strategies to defend against them. The study found 61% of respondents had experienced a deepfake incident in the past year, with 75% of those attacks impersonating CEOs or…
Russian Threat Groups Turn Eyes to the Paris Olympic Games
Russian threat groups are using old tactics and generative AI to run malicious disinformation campaigns meant to discredit the Paris Olympic Games, France and its president, and the IOC fewer than two months before the Games begin. The post Russian…
NIST 2.0: Securing Workload Identities and Access
5 min read The updated framework addresses the need to secure non-human identities. Here’s how that can extend across the guidance’s five key functions. The post NIST 2.0: Securing Workload Identities and Access appeared first on Aembit. The post NIST…
Life in the Swimlane with Emily Spector, Senior SDR
The post Life in the Swimlane with Emily Spector, Senior SDR appeared first on AI Enabled Security Automation. The post Life in the Swimlane with Emily Spector, Senior SDR appeared first on Security Boulevard. This article has been indexed from…
The Role of DevSecOps in Enhancing CNAPP Efficiency
Incorporating DevSecOps into CNAPP strategies can improve the way organizations develop and secure their applications. The post The Role of DevSecOps in Enhancing CNAPP Efficiency appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…
Security challenges in the financial sector⎪Max Imbiel (CISO, Bitpanda)
This blog is based on the podcast episode with Max Imbiel, CISO at Bitpanda. It covers the unique challenges of building secure financial applications. The post Security challenges in the financial sector⎪Max Imbiel (CISO, Bitpanda) appeared first on Security Boulevard.…
Was the Ticketmaster Leak Snowflake’s Fault?
Snowflake, Inc. says NO, threatening legal action against those who say it was. But reports are coming in of several more massive leaks from other Snowflake customers. The post Was the Ticketmaster Leak Snowflake’s Fault? appeared first on Security Boulevard.…
CISOs and Senior Leadership at Odds Over Security
Only half of cybersecurity leaders feel their C-suite understands cybersecurity risks, a Trend Micro survey found. Four in five have been told to downplay a potential risk’s severity. The post CISOs and Senior Leadership at Odds Over Security appeared first…
Mastering the Art of Least Privilege Access Implementation: A Comprehensive Guide
The concept of least privilege access has emerged as a paramount principle, serving as a cornerstone for robust identity governance and access management strategies. By adhering to this tenet, organizations can effectively mitigate the risks associated with account compromises, insider…
The Importance of Crypto Agility in Preventing Certificate-Related Outages
Digital certificates play a vital role in driving today’s powerful system of identity-based security — from securing online communications and transactions to encrypting software developer code and much more. The post The Importance of Crypto Agility in Preventing Certificate-Related Outages…
Consolidation is Coming to Corporate Security Technology
Why removing technology silos is critical to helping security teams save time, cut costs, and reduce risks. This article was originally published in Security Magazine. Those old enough to remember the software industry in the 1980s might recall some names…
Unlocking HIPAA Compliance: Navigating Access Control and MFA Guidelines
As technology continues to revolutionize healthcare operations, protecting patient data has never been more challenging. In the ongoing struggle against data breaches, last year marked a tipping point, as an unprecedented 133 million healthcare records were breached, according to the…