Governance, Risk and Compliance
Cybersecurity Compliance and Beyond: How Protocols Drive Innovation and Growth
In today's digital age, cybersecurity compliance is no longer just a legal necessity or a defensive measure; it has become a catalyst for innovation and growth ...
Security Boulevard
Comprehensive Guide to Infrastructure Robustness Metrics
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Audit, Best Practices, Infrastructure, security
Infrastructure robustness is critical for ensuring the resilience and reliability of your systems. This comprehensive guide explores key metrics used to assess and improve infrastructure robustness ...
Microsoft Fixes Four 0-Days — One Exploited for SIX YEARS
Richi Jennings | | CVE-2024-38014, CVE-2024-38217, CVE-2024-38226, CVE-2024-43491, KB5043083, KB5043936, Mark of the Web, Microsoft, Microsoft Patch Tuesday September 2024, Microsoft Windows, Microsoft Windows Zero Day, Patch Tuesday, SB Blogwatch, Windows, Windows Update
Week B: Bugs begone! This month Redmond fixes 79 security flaws in Windows and other products ...
Security Boulevard
The SBOM Survival Guide: Why SBOM Compliance is Set to Ignite IoT Security
Once SBOM and IAM provisioning knit seamlessly with policy-driven data encryption and AI-powered monitoring, they will have a far stronger security posture ...
Security Boulevard
Stay Ahead of Cyber Threats with Autonomous Penetration Testing
Explore how autonomous penetration testing with NodeZero helps organizations meet NIS 2 compliance by enhancing cybersecurity through scalable, efficient risk assessments. The post Stay Ahead of Cyber Threats with Autonomous Penetration Testing ...
Legal Impact of GDPR Data Policy Violations
GDPR violations can result in severe consequences. In its first year, over 89,000 data breaches were reported, leading to fines totaling €56 million. In 2019, the UK’s Information Commissioner’s Office (ICO) imposed ...
Russian ‘WhisperGate’ Hacks: 5 More Indicted
Richi Jennings | | Cadet Blizzard, Ember Bear, Frozenvista, GRU, GRU Unit 29155, NATO, NATO Member State, Ransomware, Russian GRU, SB Blogwatch, UAC-0056, Ukraine, ukraine conflict, Ukraine Cyber Attacks, Ukraine Cyber War, Ukraine cyberattack, Ukraine-Russia War, UNC2589, WhisperGate Wiper
Eaten by a GRU: Fake ransomware created by Russian GRU Unit 29155 attacked Ukraine and NATO—a month before the full scale invasion ...
Security Boulevard
Summer compliance webinar series: Understanding DORA compliance
Hannah Laurence | | Compliance, Events and Webinars, Liability Regulation, SBOM, software bill of materials
In the third part of our Summer of Software Regulations & Compliance webinar series, the Digital Operations Resilience Act (DORA) took center stage with Ilkka Turunen, Field CTO at Sonatype joining Friso ...
Regulation and Compliance Updates Every IT Professional Needs to Know
Regulation and Compliance Updates Every IT Professional Needs to Know Keeping up with IT compliance is a challenging task, especiallyRead More The post Regulation and Compliance Updates Every IT Professional Needs to ...
Yikes, YubiKey Vulnerable — ‘EUCLEAK’ FIDO FAIL?
Richi Jennings | | CVE-2024-45678, ECDSA, EUCLEAK, FIDO, FIDO2, Infineon, Passkeys, SB Blogwatch, YSA-2024-03, Yubikey
USB MFA SCA😱: Infineon hardware and software blamed for timing side-channel attack on popular auth tokens ...
Security Boulevard