SOCs, false positives, SOC

Closing the False Positives Gap for SOC Efficiency

Eliminating false positives can remarkably enhance security operations center (SOC) efficiency and cost-effectiveness ...
Security Boulevard
SEC rules, cybersecurity, SEC cyber data breach rules

Five Unintended Consequences of the New SEC Cybersecurity Disclosure Rule

The SEC's recent regulatory compliance mandate regarding breach disclosures is having some unintended consequences ...
Security Boulevard
CISO, CISOs, solarwinds, security, CISO corporate security

What the Charges Against the SolarWinds CISO Mean for Security in 2024

The indictment of the SolarWinds CISO by the SEC served as a harsh wake-up call to the corporate world ...
Security Boulevard
CISO LLMs AI language diversity hiring

How to Talk So Your CISO Will Listen

To communicate effectively with your CISO, you’ll need to speak their language. Here's how you can do that ...
Security Boulevard
residential proxy, IP address, VPN

What CISOs Need to Know About Residential Proxy Networks

If residential proxy networks are not already on the CISO’s radar, 2023 will be the year they will need to focus on them significantly. What is a residential proxy network, and why ...
Security Boulevard
cybersecurity, talent, management, skills, skill threats salary

Is Cybersecurity Having an Identity Crisis?

There has never been a better time to get into cybersecurity, or a worse one. The industry is crying out for professional skills but is also foundering in its efforts to retain ...
Security Boulevard
audits, cybersecurity audits, compliance, security, risk-based authentication, software audit API AuditBoard Adds Ability to Assess Third-Party Risks

Adventures in Software Audits, Part Three: The Paradigm Battle

In the third of this three-part series, we discuss how the 'sales transaction paradigm' can impact a software audit ...
Security Boulevard
privileged, accounts

A Policy of All Privileged Accounts – Overkill or Common Sense?

An attacker accessing a privileged account doesn’t begin with a root or administrator account. An attack on a privileged account usually starts with the theft of an average user’s credentials. Passwords are ...
Security Boulevard
cost of failure, security, Stop Failing At Security

Considering the Cost of Failure in Security Operations

How do you measure the cost of failure? This was a question posed by SecureIQLab’s VP of Research and Corporate Relations, David Ellis, and senior analyst Randy Abrams, during a conversation at ...
Security Boulevard