CIA

Second Swiss Firm Said to Be CIA Encryption Puppet

First Crypto AG, and now Omnisec AG: Sources say second Swiss company was also in the pocket of the CIA ...
Security Boulevard
Unisys

Unisys Adds Visualization Tools to Stealth Platform

Unisys has updated its Stealth platform that automates microsegmentation of networking environments to now include visualization and dashboard tools that make it easier to track an organization’s overall security posture in real-time ...
Security Boulevard
quantum

Why It’s Time to Quantum-Proof Your Communications Infrastructure

It’s a matter of time until the day arrives when quantum computers will crack traditional encryption. This moment, often referred to as “Y2Q,” may be as little as three to five years ...
Security Boulevard
Pay2Key

Pay2Key Ransomware Joins the Threat Landscape

As we approach the end of a year that has been trying for so many reasons, yet another ransomware has been seen in the wild targeting corporations—in particular, Israeli companies. A report ...
Security Boulevard
Google

Google Finally Pulls Chinese Apps Stealing Personal Data

After six million downloads, two spyware Baidu apps have been removed from the Play Store. What took Google so long? ...
Security Boulevard
DevSecOps

DevSecOps: 4 Reasons You Need One

Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what about DevSecOps? DevSecOps essentially adds another layer to the process by combining ...
Security Boulevard
FireEye

FireEye Acquires Respond Software to Advance Cybersecurity AI

FireEye Inc., a provider of managed security services augmented by machine learning algorithms, has acquired Respond Software, a provider of a platform that automates security incident investigations, for $186 million. Peter Bailey, ...
Security Boulevard
cloud

Cloud Compliance Doesn’t Equal Security

Despite continuous adherence to regulations, many organizations still fall prey to attacks. Ever since the cloud became the de facto infrastructure choice for forward-thinking organizations, it has enabled organizations of all sizes ...
Security Boulevard
OT

Ransomware Increase Highlights Need for Better IT, OT Security

IT networks tend to get all the attention for cybersecurity, but operational technology (OT) and the supply chain are at increasing risk of cyberattacks. Manufacturing security needs to deploy a more holistic ...
Security Boulevard
Palo Alto Networks Surfaces AWS API Vulnerabilities

Palo Alto Networks Surfaces AWS API Vulnerabilities

The Unit 42 research arm of Palo Alto Networks has published a report detailing how 22 application programming interfaces (APIs) across 16 different Amazon Web Services (AWS) platforms can be abused by ...
Security Boulevard