Monday, December 21, 2020
  • 2021 New Year Resolutions for Web Application Security
  • 6 Significant Cloud Security Threats
  • Shadow IT Adds to Remote Work Security Risks
  • SolarWinds/SUNBURST Backdoor, Third-Party and Supply Chain Security
  • Cybereason and Oracle Team Up for Security at Scale from the Endpoint to the Cloud

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

Industry Spotlight

cloud security threat

6 Significant Cloud Security Threats

Nahla Davies | December 21, 2020 | account hijacking, api, cloud misconfiguration, Cloud Security, Data breach, denial-of-service attack, insider threat
Organizations and businesses have had to turn to third-party cloud and managed security services to look for ways to bolster cybersecurity and shift from legacy to modern data platforms. However, the sudden ...
Security Boulevard
IoT security

Manufacturers Take the Initiative in Home IoT Security

Mike Nelson | December 18, 2020 | iot, IoT Security, Project CHIP, Software Security
Not so long ago, the internet of things (IoT) was considered a futuristic technology to support the factories and cities of tomorrow. Today, many of us regularly experience the IoT in our ...
Security Boulevard
identity verification

Identity Verification: Protecting Customer Data Across Borders

Christina Luttrell | December 17, 2020 | Compliance, customer identity, identity, Identity Verification, international identity verification
A single platform for international identity verification can help businesses onboard customers from across the globe, verify them in seconds and ensure compliance Today’s digital world creates opportunities for businesses to expand ...
Security Boulevard
XDR

XDR Has Promise – and a Fair Share of Risks

Sri Sundaralingam | December 16, 2020 | cybersecurity tools, Extended Detection and Response, security, security platform, XDR
The security industry is often an alphabet soup of confusing acronyms—SIEM, SOAR, SASE—and the latest acronym du jour is XDR. At first glance, you may conflate it with terms such as NDR ...
Security Boulevard
security

Unifying Security and Applications Through Identity

Chris Schueler | December 15, 2020 | cloud services, cyberattacks, identity, managed security service
Identity and security must be built into the overall enterprise IT ecosystem, not simply added on As enterprise perimeters disappear into borderless cyberspace, CISOs are struggling to protect their businesses, partners and ...
Security Boulevard
hotels

Hotels Remain a Prime Target for Hackers

Chinmai Sharma | December 11, 2020 | Cybersecurity, Data breach, Hackers, hospitality, hotels
Although all industries have felt the strain from COVID-19, the hotel sector has been particularly hard hit. As hotels move to bring occupancy rates up, they should use this time to examine ...
Security Boulevard
next-gen firewalls

Why Next-Gen Firewalls Miss the Mark for Today’s Remote Workforce

Mike Riemer | December 10, 2020 | access, COVID-19, Next Generation Firewall, NGFW, remote work, VPN
For nearly three decades, next-gen firewalls (NGFWs) have proven to be essential perimeter-based security solutions, helping the enterprise network in the detection and blocking of malicious traffic. However, infosec pros are looking ...
Security Boulevard
cloud file system

Pandemic Waves Underscore Vulnerabilities in Cloud File Systems

Edward M.L. Peters | December 9, 2020 | Cloud, Cloud Security, cloud services, COVID-19, data protection, Pandemic, shared responsibility
As the second wave of COVID-19 hits and remote work increases again, the need for secure cloud file systems to share large volumes of data is increasingly important Remote work models, accelerated ...
Security Boulevard
threat hunting

One Step Ahead: Using Threat Hunting to Anticipate the Unknown

Paul German | December 8, 2020 | data, managed detection and response, network, proactive cyber security, Security threats
Threat-hunting is a way to stay one step ahead of cybercriminals, spotting unusual activity before damage occurs A cyberthreat could be lurking in any corner of an organization’s infrastructure. The complex networks ...
Security Boulevard
smartphone

Tips From a Hacker to Keep Smartphones Safe

Nikolay Anisenya | December 7, 2020 | application, Hackers, mobile device, Mobile Security, smartphone
We can do many things using our mobile devices: hail a taxi, book a hotel, send and receive money, purchase goods online or in-store, chat and share media files, control other devices ...
Security Boulevard
Load more Loading...

TechStrong TV – Live

Watch latest episodes and shows
Featured Blog

Eric Kedrosky

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Sonrai Security Marketing

Lessons From CIO Virtual Summit

Eric Kedrosky

Why Your Cloud Security Team Ignores Security Alerts

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

3 Million Chrome Users Infected via Extensions—Here We Go Again
The SolarWinds Supply Chain Hack: What You Need to Know
AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion
Manufacturers Take the Initiative in Home IoT Security
Identity Verification: Protecting Customer Data Across Borders
2020 Data Breaches in Review
10 Ways to Protect Against DDoS Attacks
Cyber Attack Briefing: The SolarWinds Compromise is a Wake-up Call
SolarWinds, GitHub Leaks and Securing the Software Supply Chain
2 New RubyGems laced with cryptocurrency stealing malware taken down

Upcoming Webinars

Mon 21

6 AppSec Lessons from the SolarWinds and FireEye Breach

December 21 @ 1:00 pm - 2:00 pm
Jan 12

Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport

January 12, 2021 @ 3:00 pm - 4:00 pm
Jan 19

A New Year’s Ransomware Resolution

January 19, 2021 @ 1:00 pm - 2:00 pm
Jan 20

Vulnerability Discovery in the Cloud

January 20, 2021 @ 3:00 pm - 4:00 pm
Jan 28

Protecting Cloud-Native Apps and APIs in Kubernetes Environments

January 28, 2021 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

7 Must-Read eBooks for Security Professionals

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

6 Significant Cloud Security Threats
Cloud Security Cybersecurity Industry Spotlight Security Boulevard (Original) 

6 Significant Cloud Security Threats

December 21, 2020 Nahla Davies | 2 hours ago 0
Manufacturers Take the Initiative in Home IoT Security
Cybersecurity Industry Spotlight IoT & ICS Security Security Boulevard (Original) 

Manufacturers Take the Initiative in Home IoT Security

December 18, 2020 Mike Nelson | 3 days ago 0
Identity Verification: Protecting Customer Data Across Borders
Cybersecurity Identity & Access Industry Spotlight Security Boulevard (Original) 

Identity Verification: Protecting Customer Data Across Borders

December 17, 2020 Christina Luttrell | 4 days ago 0

Top Stories

Bugcrowd Report Shows Marked Increase in Crowdsourced Security
Cybersecurity Featured IoT & ICS Security Malware News Security Boulevard (Original) Spotlight Vulnerabilities 

Bugcrowd Report Shows Marked Increase in Crowdsourced Security

December 18, 2020 George V. Hulme | 2 days ago 0
3 Million Chrome Users Infected via Extensions—Here We Go Again
Analytics & Intelligence Application Security Cloud Security Cybersecurity Endpoint Featured Malware News Security Boulevard (Original) Spotlight Threat Intelligence 

3 Million Chrome Users Infected via Extensions—Here We Go Again

December 17, 2020 Richi Jennings | 3 days ago 0
AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion
Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight 

AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion

December 16, 2020 Michael Vizard | 4 days ago 0

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2020 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.