Security Operations

The Great Security Tool Consolidation: How Enterprises are Rethinking Their Security Strategy
Security teams are increasingly abandoning the long-standing approach of deploying numerous specialized point solutions in favor of consolidated security platforms ...
Security Boulevard

Cisco Infuses Security into Networking with New Nexus Smart Switch and Hypershield Integration
At Cisco Live EMEA 2025 in Amsterdam this month, Cisco unveiled the Nexus Smart Switch and Hypershield integration, a two-in-one solution that it says addresses the mounting security management pains amid sweeping ...
Security Boulevard

The year in ransomware: Security lessons to help you stay one step ahead
Operation Cronos, a Europol-led coalition of law enforcement agencies from 10 countries, announced in February that it had disrupted LockBit — one of the most prolific ransomware gangs in the world — ...

Cracking the Code: Tackling the Top 5 Cloud Security Challenges
Raghu Nandakumara | | breaches, challenges, Cloud Infrastructure, Cloud Security, microsegmentation, monitoring tools, zero trust
By developing robust, adaptive security strategies, organizations can effectively safeguard their cloud environments against evolving threats and ensure compliance with regulatory requirements ...
Security Boulevard

The CISO Evolution: From Tactical Defender to Strategic Business Partner
The chief information security officer (CISO) role has changed dramatically from just a few short years ago. Once confined to technical security, CISOs have emerged as key strategic partners in the C-suite ...
Security Boulevard

Apple Enrages IT — 45-Day Cert Expiration Fury
Richi Jennings | | 90-day certificates, 90-day TLS certificate validity, Apple, Apple Safari, browser, Browser Security, CA/B Forum, CA/Browser Forum, CAB Forum, certificate, Certificate and Key Lifecycle Management, Certificate and Key Management, Certificate Automation, mobile safari, Safari, SB Blogwatch, Sectigo
CA/B testing: Ludicrous proposal draws ire from “furious” systems administrators ...
Security Boulevard

(In)Fidelity Admits Data Breach 8 Weeks Ago — 77K PII Lost
Richi Jennings | | Access control, Access control and Identity Management, access control issues, Access Controls, and Access Control in Security+, asset management, Authentication, authorization, Banking/Fintech, broken access controls, cloud data access control, cybersecurity access controls, cybersecurity in fintech, data access control, Fidelity Investments, Fintech, fintech industry, fintech sector, improper access control, SB Blogwatch
FMR FAIL: Huge investment firm won’t say how it was hacked ...
Security Boulevard

Biggest Ever DDoS is Threat to OT Critical Infrastructure
Richi Jennings | | Analyzing DDoS Attacks, application-layer DDoS attacks, Cloudflare DDoS Protection, Critical Infrastructure, critical infrastructure attack, critical infrastructure attacks, Critical Infrastructure Security and Resilience Month, cyber attack on critical infrastructure, ddos, DDoS amplification, DDoS attack, distributed denial of service, Distributed denial of service (DDoS) attacks, distributed denial of service attack, ICS, ICS/SCADA systems, industrial control systems, Infrastructure, iot, operational technologies, operational technology, operational technology security, OT, SB Blogwatch, US critical infrastructure
Egyptian River Floods: Operational technology (OT) targeted in “world record” 3.8 Tb/s distributed denial of service (DDoS) ...
Security Boulevard

Kia’s Huge Security Hole: FIXED (Finally)
Richi Jennings | | Car Dealer, connected car security, Connected Cars, connected vehicle, Connected Vehicles, connected-car, Consumer IoT, Internet of things, Internet of Things (IoT), Internet of Things (IoT) Security, Internet of Things cyber security, iot, Kia, Korea, SB Blogwatch, South Korea, southkorea
Connected cars considered crud: Kia promises bug never exploited. But even 10-year-old cars were vulnerable ...
Security Boulevard

Are You Sabotaging Your Cybersecurity Posture?
By investing in robust ITDR solutions and avoiding the common pitfalls of underfunding, over-relying on single solutions and chasing trends, organizations have the power to stop potentially devastating data breaches in their ...
Security Boulevard