Chinese malware attack

Making a Case for Single-Vendor SASE

Thanks to a workforce that is increasingly operating remotely and accessing applications that reside outside the corporate perimeter (i.e. cloud), businesses are lacking a scalable and secure architecture that is built around an increasingly remote, cloud-based and perimeter-less environment. What’s more, with the growing adoption of edge computing and internet-of-things ... Read More
Security Boulevard
cybersecurity poverty line, data-centric, SUSE cloud Wiz Torq AirTag Skyhawk SASE security cloud security visibility PwC Survey Finds C-Level Execs Now View Cybersecurity as Biggest Risk

Rise of Single-Vendor SASE and the Challenges of Integration

In 2021, just two years after Gartner introduced secure access service edge (SASE), the SASE market size was estimated to hit a whopping $3 billion. The SASE market is expected to reach the $6 billion mark by 2028. That’s a CAGR of 10.40%. The reason? Modern enterprises must extend their ... Read More
Security Boulevard
SlashNext AI cybersecurity

MITRE ATT&CK Framework Explained: Why it Matters

We all know that cyberthreats have become more frequent, stealthier and more sophisticated. What’s more, the traditional, reactive approach to detecting threats by hunting indicators of compromise (IoCs) using markers like IP addresses, domains and file hashes is quickly becoming outdated—threats are only detected once a compromise is achieved and ... Read More
Security Boulevard
disinformation deep fakes social engineering What Does Fake News Have to Do With Cybersecurity

AI-Fueled Deep Fakes Signal New Era of Cybercrime

Information manipulation has been around since Chinese general Sun Tzu wrote “The Art of War” in 550 BC. The Russians routinely use disinformation tactics to destabilize democracies. Events like the 2020 U.S. elections or COVID-19 vaccinations highlight how political opponents and rogue nations actively practice disinformation campaigns to undermine confidence ... Read More
Security Boulevard
How I was hacked by my six-year-old daughter

How I was hacked by my six-year-old daughter

“Hacking is exploiting security controls either in a technical, physical or a human based element,” – Kevin Mitnick. Well, let me give you another quote “Daaaaaaaaaaaaddy, I am bored!” – my six-year-old daughter, yesterday. Here is the scene – I am working on a presentation about cyber security flaws in ... Read More