Incident Response

AI Workshop: Fully Automate Tier 1/2 SOC Tasks…At Scale
Shriram Sharma | | AI-SOC, Autonomous SOC, Cybersecurity, Incident Response, Morpheus AI, SBN News, Security Automation, security orchestration
Slash SOC response times from hours to minutes with Morpheus AI—register for our live AI workshop on May 7 to transform your Tier 1/2 operations. The post AI Workshop: Fully Automate Tier ...

MITRE Crisis: CVE Cash Ends TODAY — CISA says ‘No Lapse’
Richi Jennings | | cisa, CISA Research, common vulnerabilities and exposures, CVE, CVE (Common Vulnerabilities and Exposures), CVE database, CVE Program, Cybersecurity and Infrastructure Security Agency, cybersecurity funding, Department of Homeland Security, DHS, Funding & Grants, MITRE, MITRE Framework, National Institute of Standards and Technology, National Institute of Standards and Technology (NIST), NIST, SB Blogwatch, U.S. Department of Homeland Security
These are “interesting” times: U.S. government funding for the Common Vulnerabilities and Exposures program expires April 16 ...
Security Boulevard

CISA at the Last Minute Extends Funding for Crucial MITRE CVE Program
The Trump Administration is ending funding for MITRE's crucial CVE database program, a move that promises to hobble cybersecurity efforts around the world. However, CVE Board members introduce a new nonprofit organizations ...
Security Boulevard

The Hidden Cost of Backup Recovery in Ransomware Events
Ransomware preparedness isn’t just about having backups – it’s about how quickly you can use them to recover ...
Security Boulevard

Wyden to Hold Up Trump CISA Nominee Over Telecom ‘Cover Up’: Report
Senator Ron Wyden (D-OR) is demanding CISA release a three-year-old report critical of telecoms' security in the wake of the expansive Salt Typhoon hacks before he lifts a hold on President Trump's ...
Security Boulevard

Four Tips for Optimizing Data Backup and Recovery Costs
By taking simple steps like choosing a cost-effective backup storage strategy and minimizing recovery infrastructure costs, you can protect your business without bloating your budget. ...
Security Boulevard

Oracle Hack: From ‘Deny-Deny-Deny’ to ‘Oops-Oops-Oops’
Richi Jennings | | CVE-2021-35587, Larry Ellison, OCI, Oracle, Oracle Access Manager, Oracle Classic, Oracle cloud, Oracle Cloud Classic, Oracle Cloud infrastructure, Oracle Fusion Cloud, rose87168, SB Blogwatch
Classic “wordplay:” Larry’s PR angels desperately dance on the head of a pin ...
Security Boulevard

Cybersecurity Insights with Contrast CISO David Lindner | 04/04/25
David Lindner, Director, Application Security | | CISO, Cybersecurity, Disaster Recovery, Incident Response, Leadership, on call, vulnerability detection
Insight No. 1 — Cyber calm: Lead like a Zen master, fight like a ninja Remaining calm is a cornerstone of effective leadership during a cyberattack. Staying composed under pressure not only ...

App Stores OK’ed VPNs Run by China PLA
Richi Jennings | | 360 Security Technology, App Store, App Stores, Apple, CCP, china, china espionage, China-nexus cyber espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, free vpn app, google, Google Play Store, Peoples Republic of China, Privacy, Qihoo 360, SB Blogwatch, Signal Secure VPN, Snap VPN, Tech Transparency Project, Thunder VPN, TikTok, TikTok Ban, Turbo VPN, VPN, VPN Proxy Master
Bad Apple: Chinese firm banned by the U.S. is the shady entity behind a clutch of free VPN apps—with over a million downloads ...
Security Boulevard

Cybersecurity Insights with Contrast CISO David Lindner | 03/21/25
David Lindner, Director, Application Security | | Budget, Cybersecurity, Incident Response, risk, strategic leadership
Insight No. 1 — Cheaping out on cybersecurity & dental hygiene both lead to pain & cost When it comes to security budget cuts, not all choices are equal: Some can leave ...