NSA Wants To Help you Lock Down MS Windows in PowerShell

NSA Wants To Help you Lock Down MS Windows in PowerShell

A new cheatsheet from four infosec agencies tells us how to use PowerShell for good, rather than let scrotes misuse it to “live off the land.” ...
Security Boulevard
Should you use a blockchain?

Managing risk in blockchain deployments

Do you need a blockchain? And if so, what kind? Trail of Bits has released an operational risk assessment report on blockchain technology. As more businesses consider the innovative advantages of blockchains ...
SSE NIST DLP Systems and the Solutions They Offer

NIST Sets SSE Framework in Final SP 800-160 Guidance

The National Institute of Standards and Technology (NIST) published a final version of updated standards for systems security engineering (SSE) with significant content and design changes, including a renewed emphasis on the ...
Security Boulevard
AWS security best practices

AWS Security Best Practices

Discover AWS security best practices to follow while hardenign your cloud environment. Amazon Web Services is a cloud computing platform that offers computing power, storage space, content delivery and other functionalities. The ...

SOC 2 Compliance: Experts Refute 5 Common Misperceptions

There are multiple misperceptions about SOC 2 compliance that can delay or even derail your compliance journey. Learn how to avoid these misperceptions from the following auditing, compliance, and cybersecurity experts: - ...

What you need to know about PCI 4.0: Requirements 5, 6, 7, 8 and 9

In Part 1 of this series, we reviewed the first four sections of the new PCI standards. As we continue our examination of PCI DSS version 4.0, we will consider what organizations ...
insurance ransom ShinyHunters ransomware

The Million-Dollar Question: To Pay or Not to Pay Ransom?

Ransomware is one of the most serious threats to businesses today. In fact, a recent survey found that 85% of enterprises are more concerned about the prospect of ransomware attacks than any ...
Security Boulevard

NIST SP 800-161r1: What You Need to Know

Modern goods and services rely on a supply chain ecosystem, which are interconnected networks of manufacturers, software developers, and other service providers. This ecosystem provides cost savings, interoperability, quick innovation, product feature ...
Hacker Paige Thompson Could Face 45 Years in Prison — ‘Suicide by Law Enforcement’

Hacker Paige Thompson Could Face 45 Years in Prison — ‘Suicide by Law Enforcement’

Capital One hacker Paige A. Thompson has been found guilty.  But it has to be said that Capital One’s security design was absolutely awful ...
Security Boulevard

Achieve GDPR Compliance for WooCommerce in 5 Steps

If you own an eCommerce store, you've probably heard of GDPR. However, you may not be fully conversant with GDPR law and have a lot of questions in your mind. Our goal ...