Security Boulevard’s 5 Most Read Stories for the Week, May 7-May 11

A new week, a new crop of security stories. Last week, numbers ruled, as three ways of DevSecOps, seven craziest IoT device hacks, seven scary stats about GDPR noncompliance and two actively exploited zero-day vulnerabilities made headlines. Also, we offered some insight on how to detect bad actors early in the kill chain. Missed out on any of the news? Here are the five most-read stories on Security Boulevard to help you out.

The 7 Craziest IoT Device Hacks

| | Hacking, iot, security
Internet of Things (IoT) botnets have forever changed cyber-security. When an IoT botnet – which is a group of internet-connected computers, appliances or devices that have been co-opted to launch a cyber-attack – is unleashed, the results can be devastating. Nearly any internet-connected device can be considered an IoT device ...
Microsoft Patches Two Actively Exploited Zero-Day Vulnerabilities

Microsoft Patches Two Actively Exploited Zero-Day Vulnerabilities

Microsoft fixed 67 vulnerabilities across its products May 8, including two vulnerabilities that were already being exploited in the wild.The most serious and urgent issue was a remote code execution vulnerability in the Windows VBScript engine tracked as CVE-2018-8174. This flaw was found by researchers from Qihoo 360 last month ...
Stats About GDPR Noncompliance

7 Scary Stats About GDPR Noncompliance

We’re just about at T-minus two weeks until the EU General Data Protection Regulation (GDPR) deadline hits and consensus is that there are many, many organizations that haven’t even started working on compliance, let alone are in full compliance at this point. The fact is that when May 25 hits, ...
Early in the Kill Chain

Detecting Bad Actors Early in the Kill Chain

Disrupting the kill chain before attackers reach their goalCybersecurity borrows a lot of terms and tactics from the military, and kill chain is one such term used to describe the steps an attacker takes to perform a breach. Malware attacks are among the most prevalent threats that enterprises face, and ...
Ways of DevSecOps

The 3 Ways of DevSecOps (Part 1)

Have you read “The Phoenix Project“? If you haven’t, you should! It mirrors the method used by Goldratt in “The Goal,” first published in 1984. It’s a story, not a textbook. The Phoenix Project will help you understand the problems that arise in the way software is being built and deployed ...
You may also like

Be sure to check Security Boulevard daily for the latest in security news, updates and features worth noting.

Featured eBook
A Hindsight Look at The Equifax Breach

A Hindsight Look at The Equifax Breach

In this whitepaper you will understand the root cause of this breach and how it could have been easily prevented, learn how to detect open source vulnerabilities in real-time for quick remediation and get a detailed implementation plan to ensure your organization won’t become the next Equifax. This complimentary download is offered by WhiteSource. Download Now ... Read More
WhiteSource
Saleem Padani

Saleem Padani

Saleem is a highly accomplished business, marketing and technology leader with track-record of success in startups, mid-size and large technology and professional services organizations, currently the COO at MediaOps, Worldwide Program Director & Technical Evangelist at IBM, Director of Industry Solutions at Neuvis, Co-founder & Vice President of LexiBridge and Senior Software Architect at DataEase International. Saleem has passion for leading and empowering global teams to drive new initiatives, leveraging broad & deep business, strategic, marketing, technical and solution delivery skills. Saleem has an Executive M.B.A, from University of Texas at Dallas, Master’s and Bachelor’s Degree in Computer Engineering.

saleem has 17 posts and counting.See all posts by saleem