Security Analytics

Analytics and Intelligence

multi-cloud security Cloudflare cloud disaster recovery DR security

Multi-Cloud Security in 2022

As we kick off 2022, it is a good time to think about what the next year will mean for the security industry. This next year is a critical time for our ...
Security Boulevard
Global threat Corruption Business Abroad

WEF Report: Cyber Risks Pose Global Threats

The World Economic Forum’s (WEF) Global Risks Report 2022 outlined what they believe are the greatest worldwide threats and risks to economic development. In some ways, it reads like an Exodusian litany ...
Security Boulevard Fortune Favors the Hacker—$16M ‘Stolen’ Fortune Favors the Hacker—$16M ‘Stolen’

DeFi exchange got hacked yesterday, sources say. Users reported imaginary money missing from their accounts—as researchers watched it get laundered ...
Security Boulevard

Cybersecurity Outlook for 2022: Emerging Threats

As we move into 2022, we’re finding that many of the cybersecurity challenges that emerged with the pandemic still remain. Some have been directly related to the ongoing pandemic while others have ...
Security Boulevard
insider threat cybersecurity alert fatigue

Don’t Let the Great Resignation Become an Insider Threat

The Great Resignation has had a major impact on cybersecurity in multiple ways, including increasing the risk of insider threats. In a profession that already suffers from a talent gap, many organizations ...
Security Boulevard
behavioral biometrics

Behavioral Biometrics: Raising the Bar for Attackers

| | behavioral biometrics
As the economic incentive to commit digital fraud increases, so does the sophistication of the methods used to carry it out. This relationship between incentives and attack sophistication has always been present ...
‘Russian’ Wiper Malware: ‘Prelude to war’ in Ukraine

‘Russian’ Wiper Malware: ‘Prelude to war’ in Ukraine

Ukraine is again under malware attack. And the tactics look strikingly similar to 2017’s NotPetya hack by the Russian GRU ...
Security Boulevard
open source supply chain cybersecurity ransomware White House Cyber Ops

Linux Foundation, Red Hat Join Supply Chain Security Summit

Last week the White House convened government and private sector stakeholders to discuss initiatives to improve the security of open source software and ways new collaboration could drive improvements.   The discussion focused ...
Security Boulevard
zero-trust ZTNA digital identities

Using Zero-Trust to Secure Dissolving Network Boundaries

Today’s network perimeter has evolved as workloads have moved to the cloud while non-managed, mobile devices have become the norm rather than the exception. The location of applications, users and devices are ...
Security Boulevard
RATs Menlo Security remote work home branch Zix

Campaign Uses Public Cloud to Spread RAT Payloads

Everything is migrating to the cloud, including threat actors. Now it seems a trio of remote access Trojans (RATs)—Nanocore, Netwire and AsyncRAT—are being spread in a campaign that taps public cloud infrastructure ...
Security Boulevard