Modern CISOs have a new task cut out for them: determining how to navigate AI as both challenge and opportunity. The post CISOs Reconsider Their Roles in Response to GenAI Integration appeared first on Security Boulevard. This article has been…
Tag: Security Boulevard
Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools
In this first-ever in-person recording of Shared Security, Tom and Kevin, along with special guest Matt Johansen from Reddit, discuss their experience at the RSA conference in San Francisco, including their walk-through of ‘enhanced security’ and the humorous misunderstanding that…
Identity Security in M&A: Gain Visibility into Consolidated Environments with Silverfort
When a company intends to acquire another organization through a merger or purchase, it is important to know what security risks could accompany the acquisition. Without this, organizations could open themselves to significant financial and legal challenges. Following an M&A,…
HPE Aruba Vulnerabilities: Prevent Systems From RCE Attacks
Recently, HPE Aruba Networking, formerly known as Aruba Networks, has encountered significant security challenges. Vulnerabilities in their ArubaOS, the proprietary network operating system, have been identified, posing serious risks, including remote code execution (RCE). In this article, we delve into…
Hardware Level Vulnerabilities, Revisited
In August of last year, I examined several CPU bugs that posed serious security threats. The mitigations for these vulnerabilities generally involved either incorporating additional instructions or opting for alternative CPU instructions – strategies that lead to diminished system performance…
CISA and FBI Issue Alert on Path Traversal Vulnerabilities
The joint alert from CISA and FBI highlights the continued exploitation of path traversal vulnerabilities in critical infrastructure attacks, impacting sectors like healthcare. The recent CVE-2024-1708 vulnerability in ConnectWise ScreenConnect is a prime example. This flaw was exploited alongside another…
USENIX Security ’23 – GigaDORAM: Breaking the Billion Address Barrier
Authors/Presenters: Brett Falk, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott;…
Key Takeaways from RSA Conference 2024: AI and Data Security in Focus | Eureka Security
The 2024 RSA Conference focused on how AI is changing cybersecurity. AI can improve security but also introduces new risks. Data security is critical for safe and effective AI, and organizations need | Eureka Security The post Key Takeaways from…
USENIX Security ’23 – Don’t be Dense: Efficient Keyword PIR for Sparse Databases – Distinguished Paper Award Winner
Authors/Presenters: Sarvar Patel, Joon Young Seo, Kevin Yeo Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and…
How to Get PCI Compliance Certification? Steps to Obtain it
Do you recall the incidents involving Equifax, Target, and British Airways? Experiencing a data breach can significantly harm your business and reputation. According to research by the National Cyber Security Alliance, 60% of small businesses shut down within six months…
Cloud Monitor Scans For Risky Video Files in Google Drive/OneDrive
Recently, we hosted Michael Tapia, Chief Technology Director at Clint ISD in Texas, and Kobe Brummet, Cybersecurity Technician at Hawkins School District in Tennessee, for a live webinar. Michael and Kobe volunteered to share with other K-12 tech pros how…
Healthcare Software Company Gains Comprehensive Visibility with LogRhythm Axon
A healthcare identity access provider was looking for a security information and event management (SIEM) platform that could maximize visibility into potential threats and boost analyst efficiency. Due to the nature of their business and the sensitive customer data they……
Emerald Divide Uses GenAI to Exploit Social, Political Divisions in Israel Using Disinformation
Bad actors are always ready to exploit political strife to their own ends. Right now, they’re doing so with the conflict in the Middle East. A holistic defense against influence networks requires collaboration between government, technology companies and security research…
Dell Data Breach Could Affect 49 Million Customers
Dell is sending out emails to what could be as many as 49 million people about a data breach that exposed their names, physical addresses, and product order information. According to the brief message, bad actors breached a Dell portal…
Dell Hell: 49 Million Customers’ Information Leaked
DUDE! You’re Getting Phished. Dell customer data from the past six (or more?) years was stolen. It looks like someone sold scads of personal information to the highest bidder. The post Dell Hell: 49 Million Customers’ Information Leaked appeared first…
USENIX Security ’23 – URET: Universal Robustness Evaluation Toolkit (for Evasion)
Authors/Presenters: Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated…
BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security
Highlights from the largest ever BSidesSF, which brought cybersecurity professionals together to face the new issues AI brings, advanced threat actors, and scaling security. The post BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security appeared…
NASA Must Improve Spacecraft Cybersecurity, GAO Report Finds
A GAO review of NASA projects found that, while some cybersecurity challenges have been addressed, many security policies and standards remain optional. The post NASA Must Improve Spacecraft Cybersecurity, GAO Report Finds appeared first on Security Boulevard. This article has…
The Road to CTEM, Part 1: The Role of Validation
Future-proof your investment by determining what business and security initiatives a new tool may be able to support or streamline. The post The Road to CTEM, Part 1: The Role of Validation appeared first on SafeBreach. The post The Road…
Recent Breaches in Israel and Iran: A Closer Look at Cybersecurity Vulnerabilities
In recent times, Israel and Iran have been caught up in a series of conflicts and tensions, both on the geopolitical stage and in cyberspace posing significant challenges to regional stability but have also made both nations targets for cybersecurity…