Wednesday, October 4, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • Automated Incident Response with Rapid7 and Smart SOAR
  • Gartner® Hype Cycle™ for Endpoint Security, 2023
  • A Guide to IAM Compliance: Set Your Organization Up for Success
  • Two Campaigns Drop Malicious Packages into NPM
  • Comic Agilé - Mikkel Noe-Nygaard, Luxshan Ratnarav - #261 - Midwives

Raphael De Cormis
Enterprise Security – Gemalto blog

Exciting use cases of Artificial Intelligence in four industry sectors

Exciting use cases of Artificial Intelligence in four industry sectors

Raphael De Cormis | September 6, 2019 | AI, enterprise security, Health, machine learning, social media, travel, Uncategorized
We look at four industry sectors that are already using AI to change the way we go about our daily lives ... Read More
Enterprise Security – Gemalto blog
Four key trends driving sustainable use of biometrics

Four key trends driving sustainable use of biometrics

Raphael De Cormis | June 13, 2019 | biometric data, biometrics, Corporate, data, digital security, enterprise security, facial recognition, fingerprint, machine learning, security, Uncategorized
We discuss the importance of implementing practices for the responsible and ethical use of biometrics ... Read More
Enterprise Security – Gemalto blog

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Wed 11

ASPM: Leveling the AppSec Playing Field

October 11 @ 1:00 pm - 2:00 pm
Mon 16

Shadow Access: Where IAM Meets Cloud Security

October 16 @ 3:00 pm - 4:00 pm
Tue 17

Securing Cloud-Native Applications Across the Software Development Life Cycle

October 17 @ 11:00 am - 12:00 pm
Wed 18

Live Workshop on ‘SCA 2.0’: Using Runtime Analysis to Find High-Risk SCA Vulnerabilities

October 18 @ 12:00 pm - 1:30 pm
Thu 19

Managing Security Posture and Entitlements in the Cloud

October 19 @ 1:00 pm - 2:00 pm
Tue 24

When Seconds Matter: Real-Time Cloud Security With AWS and Sysdig

October 24 @ 11:00 am - 12:00 pm
Tue 24

Reporting From the Pipeline: The State of Software Security in DevOps

October 24 @ 1:00 pm - 2:00 pm
Thu 26

How to Shift Left the Right Way

October 26 @ 3:00 pm - 4:00 pm
Mon 30

Zero-Trust

October 30 @ 1:00 pm - 2:00 pm
Tue 31

AppSec 101: Complete Application Security Across the SDLC

October 31 @ 11:00 am - 12:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

Broken ARM: Mali Malware Pwns Phones
Don’t Say ‘Skynet’ — NSA’s AI Security Center is New Hub for Agency Efforts
Using ML to Accelerate Incident Management
Boards are Finally Taking Cybersecurity Seriously
How to Talk So Your CISO Will Listen
DEF CON 31 – Joseph Gabay’s ‘Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing’
2023 OWASP Top-10 Series: API10:2023 Unsafe Consumption of APIs
Google Chrome Heap Buffer Overflow Vulnerability (CVE-2023-5217) Notification
Avoid libwebp Electron Woes On macOS With positron
The CVE-2023-5217 Deja Vu – Another Actively Exploited Chrome Vulnerability Affecting a WebM Project Library (libvpx)

Download Free eBook

Managing the AppSec Toolstack

Industry Spotlight

Two Campaigns Drop Malicious Packages into NPM
Cybersecurity Data Security DevOps Featured Industry Spotlight Malware Network Security News Security Boulevard (Original) Spotlight Threat Intelligence 

Two Campaigns Drop Malicious Packages into NPM

October 4, 2023 Jeffrey Burt | 4 hours ago 0
AWS’ MadPot Honeypot Operation Corrals Threat Actors
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches 

AWS’ MadPot Honeypot Operation Corrals Threat Actors

October 3, 2023 Jeffrey Burt | Yesterday 0
Broken ARM: Mali Malware Pwns Phones
Analytics & Intelligence API Security Application Security AppSec Cybersecurity Data Privacy Data Security Deep Fake and Other Social Engineering Tactics Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight IOT IoT & ICS Security Malware Mobile Security Most Read This Week News Popular Post Securing the Edge Security at the Edge Security Awareness Security Boulevard (Original) Social Engineering Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

Broken ARM: Mali Malware Pwns Phones

October 3, 2023 Richi Jennings | Yesterday 0

Top Stories

Nutanix Simplifies Data Recovery to Thwart Ransomware Attacks
Analytics & Intelligence Cybersecurity Data Security Featured Incident Response Malware News Security Boulevard (Original) Social - Facebook Spotlight Threat Intelligence 

Nutanix Simplifies Data Recovery to Thwart Ransomware Attacks

October 4, 2023 Michael Vizard | 7 hours ago 0
Akamai Sees Surge of Cyberattacks Aimed at Financial Services
Analytics & Intelligence Application Security Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Incident Response Malware News Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Akamai Sees Surge of Cyberattacks Aimed at Financial Services

October 3, 2023 Michael Vizard | Yesterday 0
Threat Groups Accelerating the Use of Dual Ransomware Attacks
Analytics & Intelligence Cybersecurity Data Security Featured Identity & Access Malware Network Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Threat Groups Accelerating the Use of Dual Ransomware Attacks

October 2, 2023 Jeffrey Burt | 2 days ago 0

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.