Cloud Security
Ivanti CEO Promises Stronger Security After a Year of Flaws
Ivanti CEO Jeff Abbott, in an open letter and a video, outlined the steps the embattled company is taking to improve its security ...
Security Boulevard
Mapping Your Path to Passwordless
Denny LeCompte | | Authentication, Cybersecurity, Password, passwordless, passwordless-authentication, passwords, vulnerability
Navigating the shift to passwordless authentication via digital certificates demands a visionary approach that considers the immediate benefits while strategically planning for future scalability and adaptability ...
Security Boulevard
Solving Kubernetes Security Complexities with Machine Identity Management
What is Kubernetes? A foundational cloud native technology If you’re in the IT world, you’ve likely heard of Kubernetes – but what exactly is it? Kubernetes is one of the foundational cloud native technologies ...
Google Chrome Enlists Emerging DBSC Standard to Fight Cookie Theft
Google is prototyping a new technology in Chrome that is designed to thwart the growing trend among cybercriminals of stealing browser session cookies, which enables hackers to bypass multifunction authentication (MFA) protections ...
Security Boulevard
A K-12 Guide To Post-Incident Analysis
K-12 cyberattacks are increasing. According to a survey of over 3,000 information technology (IT) and cybersecurity leaders, 80% of school IT professionals experienced ransomware attacks in 2022 — up from just 52% ...
Biden Review Board Gives Microsoft a Big, Fat Raspberry
Richi Jennings | | Active Directory, Authentication, azure, Azure Active Directory, Azure AD, Azure security, cisa, CISA.gov, CSRB, Cyber Safety Review Board, Cybersecurity Infrastructure Security Administration, Entra ID, Exchange, Microsoft, Microsoft Azure, Microsoft Azure Active Directory, Microsoft Azure Security, Outlook.com, SB Blogwatch, Storm-0558
Storm-0558 forecast: Last year’s Chinese hack of federal agencies’ email is still a mystery, and “should never have occurred,” says CISA ...
Security Boulevard
Container Scanning: A Path to Enhanced Vulnerability Management
Over the last few years, containers have emerged as a cornerstone technology, enabling scalability, efficiency, and consistent environments across development, testing, and production. However, the rise of containers has also introduced new ...
Picus Security Melds Security Knowledge Graph with Open AI LLM
Picus Security today added an artificial intelligence (AI) capability to enable cybersecurity teams to automate tasks via a natural language interface. The capability, enabled by OpenAI, leverages the existing knowledge graph technologies ...
Security Boulevard
Chrome’s Incognito Mode Isn’t as Private as You Think — but Google’s Not Sorry
Richi Jennings | | adtech, Advertising, Advertising and AdTech, adverts, breach of privacy, browser, browser abuse, Chrome, cookie, Cookie Consent, cookieconsent, cookies, customer privacy, Data Privacy, FLEDGE, FLoC, GOOG, google, Google Ad, Google AdSense, Google advertising, Google Chrome, Google Chrome Security, Incognito, Incognito Mode, Link History, Privacy, Privacy Sandbox, SB Blogwatch, Topics, tracking cookies, web cookie
Short term gain for long term pain? Class action attorney David Boies asked for $5,000 per user, but got nothing—except some assurances Google will delete data it no longer needs ...
Security Boulevard
Sophos: Backups are in Ransomware Groups’ Crosshairs
Enterprises that ignore their data backups, in contemplating ransomware, do so at their own peril, according to cybersecurity firm Sophos. Protecting backups will significantly reduce the harm to a company hit by ...
Security Boulevard