Governance, Risk & Compliance Category - Security Boulevard
What is the Azure Shared Responsibility Model? blog post image

What is the Azure Shared Responsibility Model?

Most cloud providers services like Microsoft Azure operate under a shared responsibility model. Azure takes care of the security ‘of’ […] The post What is the Azure Shared Responsibility Model? appeared first ...
Integration Spotlight: Recorded Future Identity Intelligence Module

Integration Spotlight: Recorded Future Identity Intelligence Module

Monitoring, Evaluating, and Responding to Credential Dumps Across the many ways users can leverage Swimlane and Recorded Future products together, there are many unique and powerful use cases that can be implemented ...
Integration Spotlight: Recorded Future Identity Intelligence Module

Integration Spotlight: Recorded Future Identity Intelligence Module

Monitoring, Evaluating, and Responding to Credential Dumps Across the many ways users can leverage Swimlane and Recorded Future products together, there are many unique and powerful use cases that can be implemented ...
storage data fileless malware Object

How Object Storage Can Help Fight Ransomware

No organization is immune to the proliferation of ransomware. As some recent attacks have demonstrated,  even companies that aren’t directly attacked can be impacted by a major ransomware attack. And that means ...
Security Boulevard
charitable giving Giving Tuesday

Securing Corporate Philanthropy on Giving Tuesday

Tomorrow, November 30, is Giving Tuesday, a day of emphasis on charitable giving both by individuals and organizations and enterprises. The Giving Tuesday movement came into being in 2012 to encourage generosity ...
Security Boulevard
CMMC Understanding the Power of SOAR for Government

Debunking Myths About CMMC 2.0

The cybersecurity world remains dynamic. On November 4, 2021, the Department of Defense (DoD) posted an update to its Cybersecurity Maturity Model Certification (CMMC) initiative, announcing program changes dubbed CMMC 2.0. These ...
Security Boulevard
cybercriminals China India UEFI

Cybercriminals: Frenemies China, Russia, North Korea

The age-old adage that “Criminals crime” is proving true when it comes to the transnational cybercriminals at play. The cybercriminals associated with the forum RAMP (Russian) have reached out to China’s cybercriminals ...
Security Boulevard

Redirecting the Zero Trust Conversation to Build a More Robust Architecture

In a recent Tripwire survey, over 300 respondents from both private and public sectors said that implementing Zero Trust Architecture (ZTA) could materially improve cybersecurity outcomes. This result seems like a positive ...
CISO Stories Podcast: Which Approach Wins - Compliance or Risk?

CISO Stories Podcast: Which Approach Wins – Compliance or Risk?

Cybersecurity programs have evolved from the early days of compliance with regulations. Regulations are important and provide the necessary motivation for many organizations to implement security controls that may not otherwise be ...
ransomware NATO Barracuda Networks ATO Attacks

Is Ransomware a Technology Pandemic in the Making?

Ten years ago, ransomware attacks were inconvenient. But today, they present an apocalyptic national security threat capable of crippling infrastructure that the population depends on. “No one country, no one group, can ...
Security Boulevard