User Privacy Threatens Security Defenses

Lack of User Privacy Threatens Security Defenses

Data threats come from three general fronts: individuals sharing too much information, data breaches and corporations selling increasingly granular customer data. Security professionals frequently sound warnings for the first two. The last one is rarely acknowledged as a security threat and more commonly labelled a privacy issue. But security and ... Read More
Security Boulevard
State of Eavesdropping on Mobile Devices

State of Eavesdropping on Mobile Devices

Eavesdropping is a prevailing threat among many on mobile phones, with technology capable of tracking users, listening to their conversations and even logging their application usage becoming more pervasive and easier to come by. “Mobile devices contain access to all of our personal and corporate data. They are capable of ... Read More
Security Boulevard
Phishers’ Favorite Brands to Spoof

Phishers’ Favorite Brands to Spoof

Phishers are always looking for a better brand to spoof and improve their success rates. They’re quick to switch out brands to keep their bait fresh, too. Keeping the tally of their favorites in a given period may afford insights into attack trends, but the better protection may be in ... Read More
Security Boulevard
Banks Highly Vulnerable to Inside Attacks

Banks Highly Vulnerable to Inside Attacks

Banks are more serious about information security than most companies in other industries, but they’re still regularly robbed to the tune of millions and even billions of dollars. In 2016, $81 million was siphoned from the Bank of Bangladesh—just one of many gang attacks. Last year, thieves took $100 million in ... Read More
Security Boulevard
Pre-Internet Vulnerability Levels

Modernized Industrial Systems Still at Pre-Internet Vulnerability Levels

| | ICS, Industrial, iot
Industrial Control Systems (ICS) were developed decades ago when any thoughts of security centered on locking down the physical plant. That’s because they were designed, developed and deployed before the internet took root, much less blossomed into the internet of things (IoT). Despite efforts to modernize these systems—or perhaps because ... Read More
Security Boulevard
GDPR Affects IAM Usage

How GDPR Affects IAM Usage

GDPR is placing a lot of demands on companies to protect the privacy of individuals. But what does that mean for identity management? The European Union’s General Data Protection Regulation (GDPR) takes effect May 25 and aims to protect the identity of individuals. Unfortunately, its requirements are more complex than ... Read More
Security Boulevard
IAM in a Gig Economy

Tips for Using IAM in a Gig Economy

IAM can be challenging for security teams and downright vexing for freelance and short-term contract workers. These tips will help smooth the IAM path for all. Even in the strong U.S. economy—or perhaps because of it—layoffs of permanent personnel are common and an army of freelance or gig workers are ... Read More
Security Boulevard
Healthcare Data Breaches

3 Payloads in Healthcare Data Breaches

| | Data breach, health care
The news is full of a variety of attacks on healthcare data, ranging from ransomware attacks on small clinics and large hospitals to the massive data theft from the behemoth Veteran’s Administration and myriad threats in between. But as is the case with attacks in other sectors, typically little thought ... Read More
Security Boulevard
Training Machine Learning

3 Tips in Training Machine Learning for Security Work

If you’ve been evaluating new security tools, you’ve undoubtedly heard machine learning (ML) touted many times. It is fast becoming the backbone of all modern software, security systems included. Thus, it appears that resistance is futile, as some version of Skynet is likely inevitable—although which version ultimately manifests depends entirely ... Read More
Security Boulevard
Machine Learning Security

6 Ways Machine Learning Can Help with Security

If you were to believe all the marketing buzz about machine learning, you would think it the answer to all security teams’ prayers. But it isn’t. At least not yet. Even so, machine learning is pretty powerful tech and there are places it can be helpful to your security measures ... Read More
Security Boulevard
Loading...