Security Boulevard’s 5 Most Read Stories for the Week, July 9-13

A new week, a new crop of security stories. Last week, container security, credential phishing, open source software security and dark market shops selling RDP access made the headlines. In addition, we discussed how to mitigate the risks of shadow IT with CASBs.

Credential Phishing – Easy Steps to Stymie Hackers

Credential Phishing – Easy Steps to Stymie Hackers

Phishing attacks have become a common factor in our daily routines for businesses and in our personal lives. There are many different types of phishing attacks, each of which requires a slightly different defense while having some commonalities as well. This article covers a specific type of attack called credential ...
Cisco Report Cyber Attacks

Dark Market Shop Sells RDP Access to Airport System for $10

Stolen or brute-forced remote desktop protocol (RDP) credentials have played a central role in many data breaches over the years and cybercriminals have made a business out of selling them on the underground market. For as little as $3, hackers can buy remote access into sensitive systems belonging to businesses, ...
6 Open Source Software Security Concerns Dispelled

6 Open Source Software Security Concerns Dispelled

Used by developers around the world, open source components makes up 60%-80% of the codebase in modern applications. Open source components are downloaded thousands of times per day to create applications for organizations of varying sizes and across all industries. But despite the continuously growing adoption there are still myths ...
Control Defend Extend Container Security

Control, Defend and Extend Container Security

Some of the most common security challenges organizations face today can be boiled down to a breakdown in communication between development, operations and security teams, with security often being the last to know about changes. Container technology can play an important role in how these teams work together to address ...
Mitigating Risks of Shadow IT

Mitigating Risks of Shadow IT with CASBs

According to the RightScale “2018 State of the Cloud Report,” 81 percent of companies are now using the cloud, an indication that it has more than delivered on its promises of efficiency, convenience and cost optimization. Despite mass adoption, there are recognizable security gaps resulting from both misconfiguration issues and ...
You may also like

Be sure to check Security Boulevard daily for the latest in security news, updates and features worth noting.

Featured eBook
Mastering Hybrid Cloud Security

Mastering Hybrid Cloud Security

Enterprises have embraced hybrid cloud — here’s what you need to know when it comes to security You’d think by now all the cloud-computing buzzwords would’ve rained down. But hybrid cloud computing still has a fuzzy nature about it. For whatever reasons enterprises embrace cloud, hybrid cloud use is near ubiquitous. According to a 2017 ... Read More
CA Veracode
Saleem Padani

Saleem Padani

Saleem is a highly accomplished business, marketing and technology leader with track-record of success in startups, mid-size and large technology and professional services organizations, currently the COO at MediaOps, Worldwide Program Director & Technical Evangelist at IBM, Director of Industry Solutions at Neuvis, Co-founder & Vice President of LexiBridge and Senior Software Architect at DataEase International. Saleem has passion for leading and empowering global teams to drive new initiatives, leveraging broad & deep business, strategic, marketing, technical and solution delivery skills. Saleem has an Executive M.B.A, from University of Texas at Dallas, Master’s and Bachelor’s Degree in Computer Engineering.

saleem has 20 posts and counting.See all posts by saleem