Hacking Ring Security Cameras: Amazon Makes it Easy

Hacking Ring Security Cameras: Amazon Makes it Easy

A bunch of childish script kiddies have been making the lives of Ring camera owners miserable ...
Security Boulevard
breach

Companies Ignoring Third-Party Breach Alerts

What would you do if you found out through a third party that your organization had been breached and the information was discovered for sale on the dark web? The correct response ...
Security Boulevard
Cyberhaven

Cyberhaven Applies Behavioral Analytics to Better Secure Data

Fresh off raising an additional $13 million in financing, Cyberhaven has launched a tool that enables cybersecurity teams to track how data is being moved across an extended enterprise. Cyberhaven CEO Volodymyr ...
Security Boulevard
encryption

Encryption Wars, Part IV: Barr vs. Big Tech

Will AG Barr succeed in his fight to empower the U.S. government with the ability to break strong encryption against tech companies? U.S. Attorney General Bill Barr once again is decrying the ...
Security Boulevard
Trend Micro Cloud

Trend Micro Looks to the Cloud for Security

Trend Micro is the latest provider of cybersecurity tools and platforms to outline an ambitious agenda to deliver cybersecurity as a service via the cloud. Greg Young, vice president of Cybersecurity at ...
Security Boulevard
AWS cloud security

AWS Previews Cloud Security Advances

Amazon Web Services (AWS) at its recent re:Invent 2019 conference previewed two tools to advance cloud security and made available a tool that promises to simplify audits. Available in preview now, Amazon ...
Security Boulevard
mobile strategy

Lack of Mobile Strategy Creates Security Holes

How a security-focused mobile strategy can help organizations stay safe in their digital transformation efforts and beyond The focus of many organizations’ digital transformation has been on mobile devices. Employees depend on ...
Security Boulevard
Apple privacy

Apple Passive-Aggressive PR Sparks Privacy Fear (Yet Again)

Why is Apple so bad at answering simple questions? ...
Security Boulevard
Good Samaritan clause

Can Antivirus Companies Use ‘Good Samaritan’ Defense to Block Rival Software?

Is the Good Samaritan clause, intended to protect against harmful materials, too broad and ripe for abuse? The essence of information security is to allow “good” things in and keep “bad” things ...
Security Boulevard
StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns

StrandHogg Pwns 80% of Android Phones; Google Fiddles While Platform Burns

Norwegian researchers find huge vulnerability in 80% of all Android phones. Hackers have been quietly exploiting “StrandHogg” for months–if not years ...
Security Boulevard
Loading...