Monday, December 21, 2020
  • 2021 New Year Resolutions for Web Application Security
  • 6 Significant Cloud Security Threats
  • Shadow IT Adds to Remote Work Security Risks
  • SolarWinds/SUNBURST Backdoor, Third-Party and Supply Chain Security
  • Cybereason and Oracle Team Up for Security at Scale from the Endpoint to the Cloud

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

Cloud Security

cloud security threat

6 Significant Cloud Security Threats

Nahla Davies | December 21, 2020 | account hijacking, api, cloud misconfiguration, Cloud Security, Data breach, denial-of-service attack, insider threat
Organizations and businesses have had to turn to third-party cloud and managed security services to look for ways to bolster cybersecurity and shift from legacy to modern data platforms. However, the sudden ...
Security Boulevard
Creating a back door into privileged groups in Active Directory for users

IT security under attack: Why are group memberships so crucial?

Abhilash | December 18, 2020 | Active Directory, Azure Active Directory, group membership, IT Security, Log360, Privilege Escalation, security attacks, security groups, Windows security
Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other privileged resources and data on your domain ...
ManageEngine Blog

Mitigating Cloud Supply-chain Risk: Office 365 and Azure Exploited in Massive U.S Government Hack

Matt Hines | December 17, 2020 | azure, office 365, Product Insights
The central issue behind the latest headline-grabbing security breach – an incident that directly impacted several major US government agencies – highlights pervasive issues related to many organizations’ use of the popular ...
Blogs List with categories – CipherCloud
Chrome

3 Million Chrome Users Infected via Extensions—Here We Go Again

Richi Jennings | December 17, 2020 | Google Chrome, malicious browser extensions, Microsoft Edge, SB Blogwatch
28 browser extensions for Chrome and Edge were laced with malware, says an anti-virus vendor ...
Security Boulevard
Thundra Logo

Which Third-Party Pods Do You Need in Your K8s Cluster?

Serkan Özal | December 17, 2020 | Kubernetes, Monitoring, observability
A production-grade Kubernetes cluster has many requirements. For example, applications and services should be able to communicate across nodes and be served to external users. Traffic from these users should be properly ...
Thundra blog
security alert fatigue blog

Why Your Cloud Security Team Ignores Security Alerts

Eric Kedrosky | December 16, 2020 | Cloud Security
Understanding, fighting, and preventing alert fatigue in AWS, Azure, and Google Cloud The post Why Your Cloud Security Team Ignores Security Alerts appeared first on Sonrai Security ...
Blog - Sonrai Security
Solarwinds Vulnerabilty: Address the Basics First

Solarwinds Vulnerabilty: Address the Basics First

Fidelis Cybersecurity Blogs | December 16, 2020 | Cloud Security, data protection, deception, Endpoint security, Network Detection and Response, Network Security, Threat Detection and Response
The post Solarwinds Vulnerabilty: Address the Basics First appeared first on Fidelis Cybersecurity ...
Blog – Fidelis Cybersecurity
10WaysDDoSBlog1_16Dec.png

10 Ways to Protect Against DDoS Attacks

Gerhard Giese | December 16, 2020 | #financialservices, Cloud Security, ddos, Financial Services, protection, security
Distributed denial-of-service (DDoS) attacks continue to grow in size, frequency, and complexity, threatening businesses and service providers around the world. A warning was recently issued about a steep uptick of DDoS attack ...
The Akamai Blog
Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Bitglass Security Spotlight: Popular Messaging App Exposes Users’ Private Data.

Will Houcheime | December 16, 2020 | aws, Breach, Cloud Data Protection, Cloud Security, dark web, data leakage, healthcare, Malware, Mobile Security, pii, Ransomware
Here are the top stories of recent weeks: Go SMS Pro Users’ Private Data Leaked Ransomware Hits Hosting Provider, Managed.com Cryptocurrency Exchange Portal Experiences Security Breach. Capcom Confirms Data Breach via Ransomware ...
Bitglass Blog
Smartphones are not the problem with MFA security

Smartphones are not the problem with MFA security

Alex Grinman | December 15, 2020 | MFA, mfasecurity, Mobile Experience, mobilesecurity, smartphones
We've recently seen big attacks play out on prominent technology companies despite their use of smartphone-based multi-factor authentication. These attacks are real, they do happen, and it appears that even the smartphone ...
The Akamai Blog
Load more Loading...

TechStrong TV – Live

Watch latest episodes and shows
Featured Blog

Eric Kedrosky

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Sonrai Security Marketing

Lessons From CIO Virtual Summit

Eric Kedrosky

Why Your Cloud Security Team Ignores Security Alerts

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

3 Million Chrome Users Infected via Extensions—Here We Go Again
The SolarWinds Supply Chain Hack: What You Need to Know
AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion
Manufacturers Take the Initiative in Home IoT Security
Identity Verification: Protecting Customer Data Across Borders
2020 Data Breaches in Review
10 Ways to Protect Against DDoS Attacks
Cyber Attack Briefing: The SolarWinds Compromise is a Wake-up Call
SolarWinds, GitHub Leaks and Securing the Software Supply Chain
2 New RubyGems laced with cryptocurrency stealing malware taken down

Upcoming Webinars

Mon 21

6 AppSec Lessons from the SolarWinds and FireEye Breach

December 21 @ 1:00 pm - 2:00 pm
Jan 12

Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport

January 12, 2021 @ 3:00 pm - 4:00 pm
Jan 19

A New Year’s Ransomware Resolution

January 19, 2021 @ 1:00 pm - 2:00 pm
Jan 20

Vulnerability Discovery in the Cloud

January 20, 2021 @ 3:00 pm - 4:00 pm
Jan 28

Protecting Cloud-Native Apps and APIs in Kubernetes Environments

January 28, 2021 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

Managing the AppSec Toolstack

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

6 Significant Cloud Security Threats
Cloud Security Cybersecurity Industry Spotlight Security Boulevard (Original) 

6 Significant Cloud Security Threats

December 21, 2020 Nahla Davies | 3 hours ago 0
Manufacturers Take the Initiative in Home IoT Security
Cybersecurity Industry Spotlight IoT & ICS Security Security Boulevard (Original) 

Manufacturers Take the Initiative in Home IoT Security

December 18, 2020 Mike Nelson | 3 days ago 0
Identity Verification: Protecting Customer Data Across Borders
Cybersecurity Identity & Access Industry Spotlight Security Boulevard (Original) 

Identity Verification: Protecting Customer Data Across Borders

December 17, 2020 Christina Luttrell | 4 days ago 0

Top Stories

Bugcrowd Report Shows Marked Increase in Crowdsourced Security
Cybersecurity Featured IoT & ICS Security Malware News Security Boulevard (Original) Spotlight Vulnerabilities 

Bugcrowd Report Shows Marked Increase in Crowdsourced Security

December 18, 2020 George V. Hulme | 2 days ago 0
3 Million Chrome Users Infected via Extensions—Here We Go Again
Analytics & Intelligence Application Security Cloud Security Cybersecurity Endpoint Featured Malware News Security Boulevard (Original) Spotlight Threat Intelligence 

3 Million Chrome Users Infected via Extensions—Here We Go Again

December 17, 2020 Richi Jennings | 3 days ago 0
AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion
Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight 

AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion

December 16, 2020 Michael Vizard | 4 days ago 0

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2020 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.