Guest Contributor, Author at Security Boulevard
SPAs: Attack Surface Are Us

SPAs: Attack Surface Are Us

Web designers love Single Page Applications (SPAs) because they load quickly in the browser. The risk posed by these web apps should not be underestimated ... Read More
Is My Data for Sale on the Dark Web?

Is My Data for Sale on the Dark Web?

Is your company's corporate network access for sale, too? Find out now. New research shows: remote work vulnerabilities have dark web marketplaces booming ... Read More
Remote Work: Bad Cybersecurity Advice Galore

Remote Work: Bad Cybersecurity Advice Galore

Web advice is plenty and free on how to secure your IT and unmanaged devices when employees work from home. But what's all that 'wisdom' worth in practice? ... Read More
How to Spot an Unsafe Airport

How to Spot an Unsafe Airport

IT security researchers gathered Open Source Intelligence (OSINT) and probed major airports. Many are exposed on the Dark Web, they found ... Read More
Research: More Worries with Wasm

Research: More Worries with Wasm

WebAssembly is taking over execution tasks that were once the domain of JavaScript. Now Wasm is used increasingly for malicious purposes, research shows ... Read More
Why is iOS 12 a top choice for app developers when it comes to security

Why is iOS 12 a top choice for app developers when it comes to security

When it comes to mobile operating systems, iOS 12 is generally considered to be one of the most secure — if not the leader — in mobile security. It’s now a little more than a year old, and its features may be a bit overshadowed by the launch of iOS ... Read More
JavaScript: How NPM Maintainer Accounts Amplify Risk

JavaScript: How NPM Maintainer Accounts Amplify Risk

Attackers need to target only 20 specific maintainer accounts to reach more than half of the entire JavaScript npm ecosystem, security researchers warn. What's the cybersecurity impact for the digital supply chain? ... Read More
Businesses are confident in their cybersecurity efforts, but weaknesses prevail

Businesses are confident in their cybersecurity efforts, but weaknesses prevail

Today, maintaining data integrity and network security is a primary challenge for businesses everywhere. The scale of the threats they face is enormous. Those that succeed go unheralded. Those that fail end up in the headlines. Despite the risks, a shocking number of security decision-makers seem confident that their companies ... Read More
The state of the Cybersecurity skills gap heading into 2020

The state of the Cybersecurity skills gap heading into 2020

Just this year, several high-profile cyber breaches exposed confidential information and resulted in millions of dollars in damages. Cybersecurity is more important than ever — a big problem for employers facing millions of unfilled cybersecurity positions and a shortage of talented workers. As for the exact number of openings, the ... Read More
6 Tips to Prevent Social Engineering

6 Tips to Prevent Social Engineering

Social engineering is a tactic where the attacker influences the victim to obtain valuable information. Office employees are targeted to reveal confidential data about a corporation while non-specialists can come under the radar to disclose their credit card information. One might also be threatened that the attacker will hack/his her ... Read More
Loading...