Security Boulevard (Original)
Second Swiss Firm Said to Be CIA Encryption Puppet
First Crypto AG, and now Omnisec AG: Sources say second Swiss company was also in the pocket of the CIA ...
Unisys Adds Visualization Tools to Stealth Platform
Unisys has updated its Stealth platform that automates microsegmentation of networking environments to now include visualization and dashboard tools that make it easier to track an organization’s overall security posture in real-time ...
Why It’s Time to Quantum-Proof Your Communications Infrastructure
It’s a matter of time until the day arrives when quantum computers will crack traditional encryption. This moment, often referred to as “Y2Q,” may be as little as three to five years ...
Pay2Key Ransomware Joins the Threat Landscape
As we approach the end of a year that has been trying for so many reasons, yet another ransomware has been seen in the wild targeting corporations—in particular, Israeli companies. A report ...
Google Finally Pulls Chinese Apps Stealing Personal Data
After six million downloads, two spyware Baidu apps have been removed from the Play Store. What took Google so long? ...
DevSecOps: 4 Reasons You Need One
Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what about DevSecOps? DevSecOps essentially adds another layer to the process by combining ...
FireEye Acquires Respond Software to Advance Cybersecurity AI
FireEye Inc., a provider of managed security services augmented by machine learning algorithms, has acquired Respond Software, a provider of a platform that automates security incident investigations, for $186 million. Peter Bailey, ...
Cloud Compliance Doesn’t Equal Security
Despite continuous adherence to regulations, many organizations still fall prey to attacks. Ever since the cloud became the de facto infrastructure choice for forward-thinking organizations, it has enabled organizations of all sizes ...
Ransomware Increase Highlights Need for Better IT, OT Security
IT networks tend to get all the attention for cybersecurity, but operational technology (OT) and the supply chain are at increasing risk of cyberattacks. Manufacturing security needs to deploy a more holistic ...
Palo Alto Networks Surfaces AWS API Vulnerabilities
The Unit 42 research arm of Palo Alto Networks has published a report detailing how 22 application programming interfaces (APIs) across 16 different Amazon Web Services (AWS) platforms can be abused by ...

