Security Boulevard’s 5 Most Read Stories for the Week, July 2-6

A new week, a new crop of security stories. Last week, risky mobile apps, vulnerability management, security risks created by SaaS and macros-based attacks made the headlines. In addition, we published another episode of CISO conversation series, “Stop Asking CISO’s If They Care About Security.”

Security Risks Created by SaaS

Security Risks Created by SaaS (They Might Not Be What You Expect)

Software as a service (SaaS) is amazing, but it has created an entirely new set of challenges for security professionals. Although security leaders generally do deep diligence on vendors before putting sensitive data such as trade secrets and PII into a cloud-based application such as Salesforce, employees may be subverting ...
Vulnerability Management Out of Control

Is Vulnerability Management Now Out of Our Control?

I can think of three events that have happened over the last few years that were harbingers of what’s to come.The first—and most recent—was the FBI’s stern call to the public: Reboot your routers, as hundreds of thousands had been infected by a Russian malware botnet. And actually, that number ...
Stop Asking CISOs if They Care about Security — CISO/Security Vendor Relationship Podcast

Stop Asking CISOs if They Care about Security — CISO/Security Vendor Relationship Podcast

Want to get under a CISO’s skin? Ask them if they have a concern for security in their environment. It’s like asking a chef if they’re concerned about preparing food. In this week’s episode of the CISO/Security Vendor Relationship Podcast, we learn how the following: Dumbest mistakes you can make ...
Risky Mobile Apps

Risky Mobile Apps No Fun for Entertainment Sector

In case it’s not already on your risk radar, it’s time to add mobile apps to the growing list of threat vectors. Mobile apps are risky across all sectors, but more specifically, those that come from media and entertainment businesses are putting users at risk.In the month of June alone, ...
Apple Ships Meltdown Patch

Macros-based Attack Deploys Malware by Hijacking Desktop Shortcuts

A new attack that uses documents with malicious macros modifies legitimate application shortcut files from the Windows desktop to trick users into executing a backdoor program.The poisoned documents distributing this threat were observed recently by researchers from Trend Micro and contained Russian text. The first stage of the infection chain ...
You may also like

Be sure to check Security Boulevard daily for the latest in security news, updates and features worth noting.

Saleem Padani

Featured eBook
The Bot Problem: Effective Detection, Analysis & Blocking

The Bot Problem: Effective Detection, Analysis & Blocking

Bots account for 50% of all web traffic. In the U.S. alone, threat actors will cause over $12 billion in losses by next year. How do companies fight against the ever-multiplying barrage of bot attacks from bad actors? Security experts across all industries face the same challenge: how do I improve defenses against bot-generated traffic? This ebook reveals ways ... Read More
Signal Sciences
Saleem Padani

Saleem Padani

Saleem is a highly accomplished business, marketing and technology leader with track-record of success in startups, mid-size and large technology and professional services organizations, currently the COO at MediaOps, Worldwide Program Director & Technical Evangelist at IBM, Director of Industry Solutions at Neuvis, Co-founder & Vice President of LexiBridge and Senior Software Architect at DataEase International. Saleem has passion for leading and empowering global teams to drive new initiatives, leveraging broad & deep business, strategic, marketing, technical and solution delivery skills. Saleem has an Executive M.B.A, from University of Texas at Dallas, Master’s and Bachelor’s Degree in Computer Engineering.

saleem has 22 posts and counting.See all posts by saleem