Cybersecurity Category - Security Boulevard

TeamTNT Strikes Again: A Wake-Up Call to Start Securing Cloud Entitlements

| | Cloud
A few days ago, SC magazine published an article reporting that TeamTNT – a hacker group that became notorious about a year ago for targeting the unencrypted credentials of AWS IAM identities ...
Ransomware Attacks are Evolving: What You Need to Know

Ransomware Attacks are Evolving: What You Need to Know

One look at all the ransomware attacks from the past few years, and it’s clear that crypto-malware actors are attempting to maximize their financial gain. We’ve observed these threat groups using multiple ...

Protecting the New Most Vulnerable Population – The Grandparent Scam

In Part 1 of this series, we introduced the concept that the most vulnerable people on the internet are our senior population. According to the FBI, elder fraud impacts millions of American seniors ...

A Look at a Zero Trust Strategy for the Remote Workforce

If you are new to the security world, it is fair to ask yourself, “Isn’t access to data and systems always conditional? Isn’t it always granted to someone who has access to ...
Using AI and ML to Win Against Fraud

Nurturing a Relationship between AI and the Security Team

No matter the industry, adding AI technologies to work processes has made a lot of employees nervous. There is fear that automation is taking over and that robots will eventually push out ...
Security Boulevard
The Need for Deterministic Security

New Report Finds 67% of Applications in the Utility Sector Have Serious Vulnerabilities

SiliconAngle reported on a new study that found 67% of applications in the utility sector have serious vulnerabilities.  The report found that the "Window of Exposure," a key metric indicative of breach ...
AppSec Application Security Management with Sqreen's Pierre Betouin

CISOs Say Application Security is Broken

Nearly three-quarters of CISOs aren’t confident that code in cloud-native architectures is free of vulnerabilities before it goes into production, according to research from Dynatrace. The report, based on a global survey ...
Security Boulevard
ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

Details about the “ANOM” global crime sting where the FBI created a fake encrypted mobile phone for criminals that promised secure communications, new details about how the Colonial Pipeline ransomware attack started, ...
via   the Comic Noggins of   Nitrozac   and   Snaggy   at   The Joy of Tech®  !

The Joy of Tech® ‘Jeff Bezos In Space’

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech®! Permalink ...