Security Boulevard (Original)

California Federal Court Weighs In (Again) on Social Media Scraping

Social media sites such as Facebook and LinkedIn have collected personal information on hundreds of millions of subscribers. They have…

3 weeks ago

Securing the Office of the Future

Our latest episode of "The CyberHero Adventures: Defenders of the Digital Universe" focuses on answering the question: How do organizations…

3 weeks ago

How to Spot Razy Malware Undetected By AV Systems

Examining traffic patterns can help spot malware such as Razy on users' systems Note: Periodically, security researchers on the Cato…

3 weeks ago

Old Vulnerabilities Open the Door for WannaCry Ransomware

More than three years since it was discovered, WannaCry is still a threat for some organizations, research has found How…

3 weeks ago

Second Swiss Firm Said to Be CIA Encryption Puppet

First Crypto AG, and now Omnisec AG: Sources say second Swiss company was also in the pocket of the CIA.

3 weeks ago

Unisys Adds Visualization Tools to Stealth Platform

Unisys has updated its Stealth platform that automates microsegmentation of networking environments to now include visualization and dashboard tools that…

3 weeks ago

Why It’s Time to Quantum-Proof Your Communications Infrastructure

It’s a matter of time until the day arrives when quantum computers will crack traditional encryption. This moment, often referred…

3 weeks ago

Pay2Key Ransomware Joins the Threat Landscape

As we approach the end of a year that has been trying for so many reasons, yet another ransomware has…

3 weeks ago

DevSecOps: 4 Reasons You Need One

Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what…

4 weeks ago