BOTS SOC Open Systems Palo Alto Kaspersky zScaler

What’s a Pop-Up SOC, and Who Needs One?

High-profile events across the globe are prime targets for hackers, which puts a huge security burden on an event’s host. Even if the host has secured the infrastructure for day-to-day operations, a large-scale attack needs to be locked down immediately, which requires a wide range of resources. It’s often the ... Read More
Security Boulevard
SANS Johnson Controls Trojan Smart Home Leaks Lead to Cyberattacks

Can Smart Home Leaks Lead to Major Cyberattacks?

Smart speakers were everywhere this holiday season. According to a recent survey conducted by GetApp Lab, smart speakers were one of this year’s most wanted tech gifts. The new Echo Dot was the most purchased item on Amazon globally over the Thanksgiving weekend, which means that more and more kids are ... Read More
Security Boulevard
Education Sector Total Cybersecurity Safety

Education Sector Ranks Last in Total Cybersecurity Safety

Upon returning from the NICE K12 Cybersecurity Education conference in San Antonio earlier this month, I was energized by the passion and impressed with the vast collection of educators who are eager to learn about infusing cybersecurity into their classrooms. Then I read the “2018 Education Cybersecurity Report“ published by ... Read More
Security Boulevard
cybersecurity executive order threats nation-state NAC

OSS Security a Top Priority in National Cyber Strategy

The U.S. House of Representatives Committee on Energy and Commerce recently released its Cybersecurity Strategy Report, in which the committee identified several key concepts and principles to address and prevent cybersecurity incidents. “The support and stability of the open-source software (OSS) ecosystem,” ranked third among the top six priorities identified ... Read More
Security Boulevard
Palo Alto Networks risk Exabeam

Evaluating Risk Critical to Cloud Security

According to CloudAcademy’s “November 2018 Data Report,” the world is trending toward multi-cloud. In fact, multi-cloud environments have become such a reality that DevOps engineers are now expected to have concurrent proficiency in AWS and Microsoft Azure. What’s unclear, though, is how sensitive data is being protected in these multi-cloud ... Read More
Security Boulevard
infrastructure Preparing for New FERC Security Standards

5 Challenges Utilities Will Face in Preparing for New FERC Security Standards

Since the attack on the power grid in Ukraine, defending critical infrastructure against the threat of cyberattack has become a top priority. In an effort to strengthen supply chain risk management within the energy sector, the Federal Energy Regulatory Commission (FERC) approved new mandatory cybersecurity reliability standards from The North ... Read More
Security Boulevard
SlashNext To BYOD or Not BYOD

To BYOD or Not BYOD? Let Your Risk Decide

Before the iPhone came to town, BlackBerry was all the rage. No one had smartphones, but all the cool people had a BlackBerry. Technology evolved, and it was soon out with the old and in with the new, thus giving rise to the somewhat problematic enablement of BYOD programs. Considering ... Read More
Security Boulevard
fraud e-commerce E-Retailers: Stay Secure

E-Retailers: Stay Secure This (and Every) Holiday

‘Tis the season for labeling all things naughty and nice, especially when it comes to the retail sector. In anticipation of Black Friday and Cyber Monday, everyone wants to weigh in on how to avoid holiday shopping scams, but the reality is that no season poses greater cyber-risks than another ... Read More
Security Boulevard
Broadcom Symantec Carbon Black

User Experience: Achieving Performance and Security

Slow or inconsistent devices are the bane of a user’s existence. It’s understandable, as these types of experiences inhibit the user’s ability to be productive. But, a compromised user poses greater risks to the organization than a non-productive one, right? That’s the paradoxical battle security teams find themselves in as ... Read More
Security Boulevard
Adequacy Agreements, Legislation and Compliance

Adequacy Agreements, Legislation and Compliance in a GDPR World

While Capitol Hill is inundated with proposed privacy legislations from the Data Breach Prevention and Compensation Act (DBPCA), the CLOUD Act and the ENCRYPT Act, organizations the world over are trying to understand how to get their own regulations deemed adequate enough to ensure the flow of business in the ... Read More
Security Boulevard

Secure Guardrails