™

2020 US Election Security is Paramount

The 2020 election season is a Big Deal™ as well it should be.  The United... The post 2020 US Election Security is Paramount appeared first on Gurucul ...
Improving on the Typical SIEM Model

Improving on the Typical SIEM Model

Despite its inherent flaws, today’s SIEM software solutions still shine when it comes to searching and investigating log data. One effective, comprehensive approach to network security pairs the best parts of SIEM ...
Register Now Button

The Future of Connected Devices

It’s the last week of Cybersecurity Awareness Month, and the last installment of this weekly... The post The Future of Connected Devices appeared first on Gurucul ...
Illustration by Ilamparithi Raju

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we ...
Efficient auditing with machine learning and Slither-simil

Efficient audits with machine learning and Slither-simil

by Sina Pilehchiha, Concordia University Trail of Bits has manually curated a wealth of data—years of security assessment reports—and now we’re exploring how to use this data to make the smart contract ...

Sophisticated phishing

Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam. However, in this ongoing ...
11

Enhancing Visibility with Bitglass and Splunk

The complexity of organizations’ IT infrastructures is always increasing. Modern businesses are faced with cloud-based resources like software-as-a-service apps and infrastructure-as-a-service platforms, as well as personal devices, a diffuse remote workforce, IoT, ...
GRU

GRU Agents Indicted for Hacking Multiple Targets

The DoJ has charged six Russians, allegedly working for the GRU, with a huge range of computer crimes ...
Security Boulevard
Register Now Button

Securing Internet-Connected Devices in Healthcare

We’ve been talking about Cybersecurity Awareness Month in the last couple of posts, following along... The post Securing Internet-Connected Devices in Healthcare appeared first on Gurucul ...

Split-Second Phantom Images Fool Autopilots

Researchers are tricking autopilots by inserting split-second images into roadside billboards. Researchers at Israel’s Ben Gurion University of the Negev … previously revealed that they could use split-second light projections on roads ...