Boulevard Press

Making Sense of the Senseless AI in Cybersecurity

It is obvious to anyone who has attended a commercial security conference, been on the receiving end of countless security vendor pitches or tried to sift through what security product to add to their defenses: Artificial intelligence (AI) has permeated the marketing language in cyber. The promise of automation superhuman intelligence is compelling, but..

Read More

Avast scores high in malware protection | Avast

Independent lab AV-Comparatives focuses on one thing and one thing only — constant, regular tests of the leading antivirus software on the market. After putting each brand’s software suite through its paces, the lab then publishes the results in easy-to-read reports aimed at helping consumers make informed decisions in choosing the cybersecurity that’s right for them. This week,..

Read More

Women in Information Security: Theresa Payton

Last time, I had fun speaking with my friend, red team-minded student/teacher Alana Staszczyszyn. This time, I had the privilege of speaking with cybersecurity and intelligence industry veteran Theresa Payton. She’s always had tons of responsibility. She went from the White House to start her own private sector firm, Fortalice Solutions. Kim Crawley: Hi, Theresa! … Read More The..

Read More

NCSAM: It’s Everyone’s Job to Ensure Online Safety at Work

October is National Cyber Security Awareness Month (NCSAM). NCSAM is a great initiative to help educate and inform our friends and family on the importance of taking your digital security seriously. Week Three in particular aims to help users fuse cybersecurity across their work and personal lives and emphasizes the shared responsibility of employees to … Read More The post NCSAM:..

Read More

Analyzing Oracle Security – Oracle Critical Patch Update for October 2018

Today Oracle has released its quarterly patch update for October 2018. It fixes 301 vulnerabilities. The main highlights are as follows: Oracle closed 1119 issues in 2018 in total that is the same as in 2017. CPU for October 2018 contains 162 vulnerabilities in business-critical applications. The most vulnerable application is Oracle Fusion Middleware totaling The post Analyzing Oracle Security..

Read More

Prevent Fraud with “Rare and Volume Based Analytics”

We are pleased to provide details on our most popular machine learning models. Check out the next in our series of informative blog articles. Gurucul Machine Learning Model: Rare and Volume Based Analytics How does the Rare and Volume Based Analytics machine learning model work, what does it do?  This machine learning model identifies rare The post Prevent Fraud with “Rare and Volume..

Read More

Notes on the UK IoT cybersec “Code of Practice”

The British government has released a voluntary "Code of Practice" for securing IoT devices. I thought I'd write some notes on it.First, the good partsBefore I criticize the individual points, I want to praise if for having a clue. So many of these sorts of things are written by the clueless, those who want to be involved in telling people what to do, but who don't really understand the..

Read More