Unlocking the Power of Network Segmentation: A Comprehensive Guide for Enhanced Security In the dynamic world of cybersecurity, network segmentation emerges as a pivotal strategy for safeguarding digital assets. This practice involves dividing a computer network into smaller, distinct segments…
Tag: Security Boulevard
DEF CON 31 XRVillage – Brittan Heller’s ‘Fireside Chat’
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
The FTC updated the Safeguards Rule. Here’s how to avoid notification events.
In response to continuing data breaches at entities with lesser regulatory oversight, the FTC has revised its Safeguards Rule for the second time in many years. This new revision will take effect 180 days after publication in the Federal Register…
Top Ten Tips for CISOs and CFOs to Strengthen their Relationships
In today’s business climate CFOs must understand and communicate how cyber risk translates to dollars and cents. This challenge arises during discussions about cybersecurity budgets, leading to potential confusion. And Read More The post Top Ten Tips for CISOs and…
Visa: AI Adds to the Cyberthreats Holiday Shoppers Will Face
For credit card giant Visa, the holiday season is always an extremely busy time. It not only brings out millions of people using plastic to pay for gifts, seasonal food, and decorations, but also bad actors armed with ever-evolving methods…
Google to Force-Block Ad Blockers — Time to Get Firefox?
Manifest V3: Destiny. Huge advertising monopoly flexes muscles: “Manifest V2” extensions to be nuked, but “V3” cripples ad blockers. The post Google to Force-Block Ad Blockers — Time to Get Firefox? appeared first on Security Boulevard. This article has been…
Automation in Healthcare Data Privacy and Compliance
In the healthcare sector where data privacy and compliance are paramount, automation manifests as a formidable defense tool. The post Automation in Healthcare Data Privacy and Compliance appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Mitigating Cybersecurity Risks in a Hybrid-Work World
This shift toward remote work has opened up new opportunities for cybercriminals to exploit vulnerabilities and compromise sensitive data. The post Mitigating Cybersecurity Risks in a Hybrid-Work World appeared first on Security Boulevard. This article has been indexed from Security…
Strengthening Access Control Testing
Strengthening Access Control Testing: The Key Questions You Need to AskMake no mistake: businesses are under attack. There is an increasing gap between objectives and execution when it comes to securing our organizations, and access governance along with effective access…
Reimagining Risk Assessment: Insights from the SEC
Reimagining Risk Assessment: Insights from SEC’s Chief Accountant SEC’s Chief Accountant, Paul Munter, recently offered insights on how companies should reimagine risk assessment. In his address, ‘The Importance of a Comprehensive Risk Assessment by Auditors and Management,’ he highlights a concerning…
What is GDPR Compliance and its 7 principles?
In the quick-paced digital world, personal data is extremely valuable. This makes privacy protection essential. With 67% of EU residents aware of it, the GDPR is thought to be the strictest data privacy law in the world. In the year…
DEF CON 31 – winn0na, and Panel: Hacker Court Interactive Scenario
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via the organizations YouTube channel. Permalink The post DEF…
Key Take Aways from NIST Releases 800-171 Revision 3
On November 9th 2023 National Institute of Standards and Technology, NIST, released special publication 800-171 Revision 3 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations as a Final Public Draft. Both the full draft and accompanying assessment methodology were…
Industry Alert: How Fake Reviews and Bogus Rates Are Impacting Travel
Today, where wanderlust meets the internet, planning the perfect getaway often involves navigating a labyrinth of online reviews and hotel rates. But as the travel and hospitality industry continues to flourish in the virtual realm, so does the prevalence of…
FBI Shuts Down IPStorm Botnet as Its Operator Pleads Guilty
The notorious IPStorm botnet proxy network, which first spun up in 2019 targeting Windows systems and two years later expanded to devices running other operating systems, is shut down and its creator in jail after pleading guilty to related criminal…
FBI’s Warrantless Spying on US Must Continue, Says FBI
Privacy, schmivacy: FBI head Christopher Wray (pictured) doesn’t see what all the fuss is about. Just renew FISA section 702 already! The post FBI’s Warrantless Spying on US Must Continue, Says FBI appeared first on Security Boulevard. This article has…
The ABCs of API Security: A New (Free!) Learning Center
APIs have been with us since before they were called APIs. Application programming interfaces as an interface between software or between users and software have been around since the 1940’s, around 20 years before such interfaces were called APIs. In…
Exclusive Report: The State of Online Consumer Brand Impersonations in 2023
There’s no denying the importance of online sales to retail and other consumer-facing brands. Forecasts predict worldwide e-commerce sales will grow 56% in the coming years… The post Exclusive Report: The State of Online Consumer Brand Impersonations in 2023 appeared…
MOVEit Hack: What went wrong, and how to course correct
What the MOVEit Breach Tells Us About the Challenges of Patching On May 31, 2023, little-known software developer Progress Software published details of a critical vulnerability in MOVEit Transfer, a popular managed file transfer service. It soon transpired that notorious…
The Move Away From Passwords Will Be Gradual, Delinea Survey Finds
Passwords in the workplace aren’t going away anytime soon, despite ongoing efforts from the likes of Google, Microsoft, and Apple to push corporations to adopt other authentication methods like passkeys and biometrics. Consumer technology like smartphones and personal email accounts…