Boulevard Press

USENIX Security ’23 – Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security

Authors/Presenters: *Alden Hilton, Casey Deccio, Jacob Davis,* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel...

Read More

CIS Compliance Best Practices and Advice

A simple guide to CIS compliance for enterprise security teams CIS compliance is a critical benchmark for organizations aiming to enhance their cybersecurity posture and protect against prevalent cyber threats. Businesses must adhere to CIS cybersecurity standards, and although conformity is voluntary, it is widely adopted across various industries for best practices. Adherence to..

Read More

Strengthening Cyber Resilience: A Milestone Partnership

As the CEO of HYAS, I am thrilled to announce a pivotal partnership with ZainTECH, a trailblazer in integrated digital solutions and part of the esteemed Zain Group. This collaboration signifies a significant step forward in our shared mission to bolster cyber defenses across the Middle East, leveraging our innovative HYAS Protect solution to safeguard digital assets with unparalleled..

Read More

The Gartner® Market Guide: Unleash the Power of Network Detection and Response with AI-Augmented Detection

The Gartner® Market Guide for Network Detection and Response sheds light on the key trends and recommendations for security and risk management leaders looking to leverage NDR capabilities. MixMode was listed as a representative vendor within the market guide, offering advanced AI capabilities that enhance network detection and..

Read More

AI Driven by Human Expertise: Hyperproof’s Bold Hybrid Approach to AI in GRC

Throughout 2024, artificial intelligence (AI) has steadily revealed its potential to revolutionize industries. AI presents a particularly attractive use case in the evolving world of Governance, Risk, and Compliance (GRC).  At Hyperproof, we believe organizations must move deliberately but need to avoid AI impulsiveness. In doing so, our strategy has been carefully crafted to empower... The post..

Read More

Understanding the Different Types of Audit Evidence

Audit evidence lies at the heart of cybersecurity audits and assessments, providing tangible proof of an organization’s adherence to cybersecurity measures.  Being secure is not merely about having a secure infrastructure; it’s about ensuring that every aspect of that security is verifiable and transparent. Today, we’ll delve into a pivotal element of this process: audit The post..

Read More