Streamline your SBOM management with SBOM Manager

Streamline your SBOM management with SBOM Manager

Modern software development means applications are woven from diverse components sourced from in-house development, open source repositories, and external vendors. Keeping track of all these dependencies is becoming more critical as governments ...
How Ivanti’s Vulnerability Led to CISA Breach?

How Ivanti’s Vulnerability Led to CISA Breach?

Data breaches are an ongoing threat to businesses of all sizes and types operating across industries. Violations can have a significant impact on large groups, small businesses, government agencies, and nonprofits. This ...
Protecting Against Attacks on NTLM Authentication

Protecting Against Attacks on NTLM Authentication

When it comes to cyberattacks, March has come in like a lion for Microsoft. Last week, Microsoft said in an SEC filing that that information stolen in a hack of senior leaders’ ...
ByteDance cCEO Shou Zi Chew

TikTok ‘Ban’ — ByteDance CEO and EFF are BFFs

7521 momentum builds: Shou Zi Chew plays for time, while Electronic Frontier Foundation says TikTok-kill bill is DOA ...
Security Boulevard
Randall Munroe’s XKCD ‘Earth’

Randall Munroe’s XKCD ‘Earth’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink ...
Introducing Attacknet: Chaos Testing for Consensus Protocols & Blockchain Nodes

Releasing the Attacknet: A new tool for finding bugs in blockchain nodes using chaos testing

By Benjamin Samuels (@thebensams) Today, Trail of Bits is publishing Attacknet, a new tool that addresses the limitations of traditional runtime verification tools, built in collaboration with the Ethereum Foundation. Attacknet is ...
ZTNA, migrating, backup data, zero-trust, security, zero-trust, business, policy container zero-trust ZTNA

Zero-Trust Network Access: Why so Many Teams Get it Wrong

Zero-trust encompasses a variety of technologies, from strong identity systems to microsegmentation. Why are so many organizations getting it wrong? ...
Security Boulevard
organization, zero-trust, trust supply chain third-party

Navigating the NSA’s New Zero-Trust Guidelines

New guidelines from the NSA provide public sector and private organizations with the necessary framework to approach zero-trust ...
Security Boulevard

Drones and the US Air Force

Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change. The F-35A certainly remains an important platform ...

CISA Adds JetBrains TeamCity Vulnerability To KEV Catalog

The US Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical JetBrains TeamCity vulnerability, emphasizing the urgent need for users to take preventive measures. The recently discovered flaw has been added ...