Video Interviews

Julianna Lamb on Choosing Authentication Platforms Over DIY
Stytch CTO Julianna Lamb explains why, when it comes to authentication, most organizations are going to be better off relying ...

Eric Brüggemann on Code Intelligence Launching Spark
Eric Brüggemann, CEO of Code Intelligence, introduces Spark, their new AI-driven security testing tool. Spark automates vulnerability detection by integrating ...
Analytics and Intelligence
Analytics & Intelligence Cyberlaw Cybersecurity Data Privacy Data Security DevOps Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches
FINALLY! FCC Gets Tough on Robocall Fraud
Incident Response

Cloud Security Cyberlaw Cybersecurity Featured Identity & Access Incident Response Industry Spotlight Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Vulnerabilities
Canadian Man Stole $65 Million in Crypto in Two Platform Hacks, DOJ Says
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Insider Threats IOT IoT & ICS Security Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities
CISA/FDA Warn: Chinese Patient Monitors Have BAD Bugs
IoT & ICS Security
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threats & Breaches Vulnerabilities
This is HUGE: Biden’s Cybersecurity Exec. Order — Big Parting Gift to Trump
Analytics & Intelligence Cloud Security Cyberlaw Cybersecurity Data Privacy DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches
Allstate Violates Drivers’ Privacy, Texas AG Alleges
Industry Spotlight

Analytics & Intelligence Cyberlaw Cybersecurity Data Privacy Data Security DevOps Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches
FINALLY! FCC Gets Tough on Robocall Fraud
KYC isn’t a Thing, claims telco: Commissioner Brendan Carr (pictured) wants $4.5 million fine on Telnyx, for enabling “illegal robocall scheme.”

Cloud Security Cyberlaw Cybersecurity Featured Identity & Access Incident Response Industry Spotlight Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Vulnerabilities
Canadian Man Stole $65 Million in Crypto in Two Platform Hacks, DOJ Says

Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Insider Threats IOT IoT & ICS Security Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities
CISA/FDA Warn: Chinese Patient Monitors Have BAD Bugs

Analytics & Intelligence Cyberlaw Cybersecurity Data Privacy Data Security Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Malware Most Read This Week Network Security News Popular Post Ransomware Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches
Ransomware Scum — Out For Blood: NYBCe is Latest Victim

Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threats & Breaches Vulnerabilities
SLAP/FLOP: Apple Silicon’s ‘Son of Spectre’ Critical Flaws
Sponsored Content

Cloud Security Cybersecurity Data Security Featured Malware Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - LinkedIn Social - X Sponsored Content Spotlight Threat Intelligence
FunkSec: A New Ransomware Group Buoyed by AI
A new ransomware group called FunkSec claimed 85 victims in December but its members appear to be lesser-skilled hackers using generative AI and inflated attack numbers to bolster their capabilities and reputation, according to Check Point researchers.

Sealing Entry Points and Weak Links in the Environment – How Dell is Building an Iron Wall of Defense
Nov 13 | Sulagna Saha
Comments Off on Sealing Entry Points and Weak Links in the Environment – How Dell is Building an Iron Wall of Defense

Citrix Boosts Security for Remote Application Accesses With “More Security Layers”
Oct 30 | Sulagna Saha
Comments Off on Citrix Boosts Security for Remote Application Accesses With “More Security Layers”
Click here for Industry spotlight inclusion guidelines
The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content. While there are vendor blogs in the Security Bloggers Network, original content from these vendors are featured here. The articles here must meet several criteria to be published:
- * Must be original when published
- * Must be vendor neutral
- * Must be transparent as to authorship
- * Must be of value to the community