Uncategorized

FBI’s Warrantless Spying on US Must Continue, Says FBI
Richi Jennings | | 4th Amendment, Democracy, FBI, FBI Director Christopher Wray, Federal Government, FISA, Fourth Amendment, government, government access, government surveillance, Government Surveillance Reform Act (GSRA), lawful surveillance, mass surveillance, nsa, police surveillance, Privacy, SB Blogwatch, Section 702, surveillance, US Constitution, US FBI, warrantless search
Privacy, schmivacy: FBI head Christopher Wray (pictured) doesn’t see what all the fuss is about. Just renew FISA section 702 already! ...
Security Boulevard

5 Critical Security Benefits of User Management Platforms
Here's why user management platforms should become an inseparable part of your security stack ...
Security Boulevard

IBM: Cost of a Data Breach Hits Another High
The average cost to an organization hit with a data breach reached a record high this year, though those companies are split on who they believe should foot the bill, according to ...
Security Boulevard

Microsoft FAIL: ‘BlackLotus’ Bootkit Breaks Secure Boot
The BlackLotus malware targets UEFI Secure Boot. For a mere $5000, you too can own it ...
Security Boulevard

Threat Actors Turn to AiTM to Bypass MFA
Threat actors have started moving away from authenticating via legacy protocols to bypass multifactor authentication (MFA) in Microsoft 365, according to an Expel report on cybersecurity trends. Instead, malicious actors are adopting ...
Security Boulevard

What Is IT Mapping and 5 Critical Security Benefits
Image Source What Is IT Infrastructure Mapping? IT infrastructure mapping is the process of creating a visual representation of an organization’s information technology systems, components, and their relationships, including hardware, software, network ...
Security Boulevard

Application Security for Microservices: API Gateway, Service Mesh, and More
Image Source What Is Microservices Security? Microservices security refers to the practices and strategies used to secure a system that is built using a microservices architecture. Microservices architecture is a way of ...
Security Boulevard

Hottest Security Tech in 2023: MXDR, Next-Gen DAST, SASE, and More
Image Source As the threat landscape continues to evolve and cyber attacks become more sophisticated, organizations are increasingly looking for new and innovative ways to protect their networks, devices, and data. In ...
Security Boulevard

Locking Down Kubernetes: RBAC, Audit Logs, etcd Security and More
What is Kubernetes Security? Kubernetes is a highly extensible and portable container orchestration platform commonly used by enterprises and various industries worldwide. This rapidly expanding ecosystem helps manage container workloads and services ...
Security Boulevard

Using the Kubernetes Lens Dashboard to Boost Kubernetes Security
Image Source Kubernetes security is a complex challenge. Luckily, new open source tools are springing up to help address it. I’ll discuss a new, popular tool called Kubernetes Lens, which is making ...
Security Boulevard