Tag: Security Boulevard

HITRUST & PASSWORDS: 7 Important Password Policies for HITRUST

Our recommended healthcare password policies that complement and support HITRUST. Since its founding in 2007, HITRUST (Health Information Trust Alliance) champions programs that safeguard sensitive information and manage information risk for global organizations across all industries. HITRUST works with privacy,…

Security Compass CEO Sets DevSecOps Strategy

Security Compass, a provider of tools for streamlining risk analysis, has appointed Rohit Sethi to be its CEO after receiving additional funding from FTV Capital. Security Compass founder and previous CEO Nish Balla will remain on the board of directors.…

Cloud, a Year in Review and Looking Forward

The post Cloud, a Year in Review and Looking Forward appeared first on CCSI. The post Cloud, a Year in Review and Looking Forward appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: Cloud,…

Best Practices in Database Security Planning

As the volume of enterprise data grows, database security is becoming more challenging than ever before. According to IDC, the volume of data worldwide will increase tenfold to 163 zettabytes by 2025, with most of that being created and managed…

Who Should the CISO Report To in 2020?

The debate over who the CISO should report to is a hot topic among security professionals, and that shows no sign of changing soon. That’s because there is still no standard or clear-cut answer. Ask CISOs themselves for their opinion,…

Understanding Policies: BitLocker and FileVault 2

The JumpCloud BitLocker and FileVault 2 Policies are key for enforcing FDE at scale across an organization’s Windows and Mac fleets. The post Understanding Policies: BitLocker and FileVault 2 appeared first on JumpCloud. The post Understanding Policies: BitLocker and FileVault…

XKCD ‘Unsubscribe Message’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Unsubscribe Message’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD ‘Unsubscribe Message’

Keep Telnet Off the Internet – Here’s Why

There are countless devices on the internet with open Telnet ports—at least 515,000 of them have easily-guessable username/password combos. The post Keep Telnet Off the Internet – Here’s Why appeared first on Security Boulevard.   Advertise on IT Security News. Read…

IT Teams Need More Than Password Managers

IT departments need more than a password manager to keep them—and a company’s data—safe from cyberthreats All companies today are, to some extent, dependent on technology and the IT teams driving their systems and security in the background. These IT…

Security Pros Offer Best Bangs for 2020 Budget

How best to utilize your 2020 security budget? Here are a few recommendations from those in the know The new year is a chance for a fresh start, and for many organizations, that fresh start comes with a new budget…

XKCD ‘Bad Map Projection: South America’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Bad Map Projection: South America’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD ‘Bad Map Projection: South America’

Why IAM is a Must-Have in a Recession

IT departments are responsible for adapting to the changes a recession brings, which often involve heavy reliance on IAM tools. The post Why IAM is a Must-Have in a Recession appeared first on JumpCloud. The post Why IAM is a…

BBP: My Path to the CISO Chair

Testing, testing. May I have your attention, please. *Ahem* Allow me to introduce myself and this new series of articles for The Ethical Hacker Network. My name is Stephanie, better known as Steph or InfoSteph in the community. I have…

The Joy of Tech® ‘Trump: Step up Apple!’

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® Permalink The post The Joy of Tech® ‘Trump: Step up Apple!’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: The Joy of Tech® ‘Trump: Step up…

NIST Publishes Privacy Framework

The National Institute of Standards and Technology, an arm of the U.S. Department of Commerce, has published version 1.0 of a privacy framework to help organizations think through the process of securing personal data. The NIST privacy framework consists of…

Compliance and Privacy in the GDPR Era

In the age of GDPR and CCPA, there seems to be more conjecture about compliance and personal privacy than there is about the weather. It’s understandable, as predicting the conditions outside seems a lot easier than devising and implementing an…

Clop Ransomware Not Just a CryptoMix Variant

When Clop was discovered by Jakub Kroustek in February 2019, all indicators showed that it was a new CryptoMix with the .CLOP, or in some circumstances .CIOP, extension tagged onto encrypted files. Since this discovery, the ransomware operators behind Clop…

How Next-Gen WAF Empowers the DevOps Lifecycle

Signal Sciences next-gen WAF can send and receive data to and from a wide range of security and DevOps tools via our API and integrations with various infrastructure and security tooling. The layer 7 telemetry we gather from inspecting and……

What’s New in Tufin Policy Orchestration Suite R19-3

We are excited to welcome 2020 with the release of Tufin Orchestration Suite 19-3 with new features and enhancements, including greater support of our customers’ Software-Defined Networking (SDN) initiatives, whether they implemented Cisco Application Centric Infrastructure (ACI) or VMware NSX-T…

2019 in Review: Data Breach Statistics and Trends

What were the most significant data breaches in 2019? Will ransomware still be a threat in 2020? (Spoiler alert: It’s forecast to be worse than ever.) Which industries were attacked most? * We have put together a shortlist of overview…

XKCD ‘Tattoo Ideas’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Tattoo Ideas’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD ‘Tattoo Ideas’

5 Cybersecurity Threats That Will Dominate 2020

At MixMode, we can’t help but imagine the flip side of all that potential. An increasingly connected cyber landscape means an increased number of potential targets for bad actors. New tech is exciting, but it’s often inherently vulnerable to cyberattacks.…

Leveraging Machine Learning for Cross-Channel Fraud Detection

Financial fraud occurs every day, accumulating in trillions of dollars in losses each year. In some… The post Leveraging Machine Learning for Cross-Channel Fraud Detection appeared first on Gurucul. The post Leveraging Machine Learning for Cross-Channel Fraud Detection appeared first on…

Paradise Ransomware decryption tool

We’re happy to announce a new decryptor for Paradise Ransomware. Paradise Ransomware, initially spotted in 2017, has been aggressively marketed as a service to interested affiliates. After infection, it checks whether the keyboard language is set to Russian, Kazakh, Belarus…

Top 3 Myths About Homomorphic Encryption

There’s been a lot of buzz surrounding homomorphic encryption because it comes with a lot of promise. It stands out from other encryption methods as it guarantees the encryption of data while it’s being used for computation. In this scenario,…

Top 10 Blog Lists

We have written a lot over the past year and beyond, and we wanted to provide you with our Top 10 lists! Take a look and gain some new knowledge for the new year!! Top 10 Blogs from 2019 Better…

Cloud-Based vs. On-Prem IAM

Organizations across the globe are wondering whether identity management has evolved into the battle of cloud-based vs. on-prem IAM. The post Cloud-Based vs. On-Prem IAM appeared first on JumpCloud. The post Cloud-Based vs. On-Prem IAM appeared first on Security Boulevard.…

Web-Based LDAP Authentication

Web based LDAP authentication is highly sought after in modern IT organizations. Fortunately, LDAP-as-a-Service solutions are now available. The post Web-Based LDAP Authentication appeared first on JumpCloud. The post Web-Based LDAP Authentication appeared first on Security Boulevard.   Advertise on…

Network Traffic Analysis for IR: UDP with Wireshark

Introduction to UDP The User Datagram Protocol (UDP) is one of the two main protocols that sits between the Internet Protocol (IP) layer and higher-level, specialized protocols like the hypertext… Go on to the site to read the full article…

How Protected is Your Health Information?

Protected Health Information (PHI) is the term given to health data created, received, stored, or transmitted by HIPAA-covered entities and their business associates in relation to the provision of healthcare, healthcare operations, and payment for healthcare services. This might not…

Webinar: Shellcode for the Masses

Register Now to Learn Shellcoding from the Ground Up! In the art of binary exploitation, there is one ominous “hacker” term you will hear quite often: shellcode. What is shellcode? How can it be used, and how do exploit developers…

Partners in Cloud: Bitglass | Zscaler

As companies expand, the adoption of cloud services grows in parallel. Bitglass’ Cloud Adoption Report recently released in 2019, found that 86% of enterprises have deployed cloud-based tools. These cloud services come with a plethora of benefits, including scalability, agility,…

Protecting Web Apps Against Client-Side JavaScript Attacks

Many security researchers believe JavaScript attacks are a major threat to web applications. The rise of Magecart, which uses web skimming (or formjacking) to illegally capture credit card and personal information from site visitors, made the threat immediate. British Airways…

Wind River Acquires Star Lab for IoT Security

Wind River today announced it has acquired Star Lab to enable customers to secure embedded systems running Linux. Terms of the deal were not disclosed, and Star Lab will continue to operate as a subsidiary of Wind River. As more…

In Case of Fire: Break Windows

When a client calls us to pentest a web application that is only available in Internet Explorer. I cringe. I don’t know if it’s flashbacks from the countless hours spent getting a website compatible with IE, or the trauma from…

Busting Top Myths About Privileged Access Management

Today, businesses everywhere are investing in infrastructure to support growth – whether that’s moving to the cloud or automating tasks and processes.  However, the newly introduced devices, application stacks and accounts that come with this… The post Busting Top Myths…

How to Whitelist Applications on Windows 10 Devices

Windows 10 devices are widely popular in enterprises as well as educational organizations. Windows Operating System still holds up the majority of the market share for desktops. Thanks to user familiarity, Windows desktops are here to stay.  As Windows 10…

The Non-Human Entities that Plague the Cloud

Entities that make cloud services work together also pose a security risk. Here are four worth considering At the average-sized company today, employees use hundreds of different cloud services. All of these apps integrate with each other using APIs, roles…

Businesses Warned of Iran Cyberattacks

Iran vowed revenge after a U.S. airstrike ordered by President Donald Trump killed the country’s top general Qasem Soleimani earlier this month. While recent missile strikes conducted by Iran against U.S. bases in Iraq was the first public move to…

macOS Catalina Patch Management

IT organizations can automate macOS Catalina patch management to streamline operations while maximizing security. Find out how to do so here. The post macOS Catalina Patch Management appeared first on JumpCloud. The post macOS Catalina Patch Management appeared first on…

Securing Interactive Kiosks IOTs with the Paradox OS

Article by Bernard Parsons, CEO, Becrypt Whether it is an EPOS system at a fast food venue or large display system at a public transport hub, interactive kiosks are becoming popular and trusted conduits for transacting valuable data with customers.…

How to Whitelist or Blacklist apps on Android & iOS

Application whitelisting or blacklisting is crucial on enterprise devices to ensure that the productive employee time is not wasted on non-work applications. As digital transformation is embraced by enterprises, by and large, having devices with unlimited access to entertainment apps…

Billions of Medical Images Leaked in Huge Privacy Puzzle

Security researchers say healthcare providers are failing to secure mind boggling amounts of highly sensitive patient medical data. The post Billions of Medical Images Leaked in Huge Privacy Puzzle appeared first on Security Boulevard.   Advertise on IT Security News. Read…

Six Reasons Why ForgeRock SDKs Make Sense

  At ForgeRock, we’re expanding the ease of use of our ForgeRock Identity Platform. Now, if you have ForgeRock Access Manager (AM), Identity Manager (IDM), and Directory Service (DS), your developers can take advantage of our new open source SDKs…

Do Midsized Companies Need a CISO?

Chief information security officer, or CISO for short—it’s a very popular title lately, being added to C-suites at companies of all sizes. It seems corporate boards feel a company isn’t considered serious if it doesn’t have a CISO or similarly…

How to Rein In Your Unmanaged Cloud in 4 Steps

The prevalence of migration to the cloud highlights the catch-22 of cybersecurity: the security vs. convenience tradeoff. But it doesn’t have to be this way. The post How to Rein In Your Unmanaged Cloud in 4 Steps appeared first on…

XKCD ‘Star Wars Voyager 1’

via the comic delivery system monikered Randall Munroe at XKCD! Permalink The post XKCD ‘Star Wars Voyager 1’ appeared first on Security Boulevard.   Advertise on IT Security News. Read the complete article: XKCD ‘Star Wars Voyager 1’

Is Google Cloud Identity Premium Right for Your Org?

Google Cloud Identity Premium extends identities used for Google services to third-party web applications. It also has some MDM features. The post Is Google Cloud Identity Premium Right for Your Org? appeared first on JumpCloud. The post Is Google Cloud…

The Marriage of Data Exfiltration and Ransomware

Ransomware and Data Exfiltration are being combined to further complicate the lives of victims. How will this new development shake out? The post The Marriage of Data Exfiltration and Ransomware appeared first on Security Boulevard.   Advertise on IT Security…

AWS Cloud Directory Pricing

As IT admins evaluate AWS Cloud Directory, pricing is a leading concern. Let’s break down their pricing model and how it compares to functionality. The post AWS Cloud Directory Pricing appeared first on JumpCloud. The post AWS Cloud Directory Pricing…

Cybersecurity Maturity Model Certification (CMMC) Levels

The CMMC model has five defined levels, each with a set of supporting practices and processes. Practices range from Level 1 (basic cyber hygiene) and to Level 5 (advance/progressive). […] The post Cybersecurity Maturity Model Certification (CMMC) Levels appeared first…