Syndicated Blog - Security Boulevard

Syndicated Blog

Blog ��� Lastline
Advanced Malware Protection
cyberwarfare strategy theory FI

Asynchronous Warfare, Part 4: OODA-Loop 2.0 and the Four Golden Rules

By Dr. Dennis Prange and edited by Andy Norton NOTE: This is part 4 of a 4-part series on Asynchronous Warfare. In part 1 of this blog series, we described the roots ...
AI Network Security FI

Network Security Challenges Create a Commercial Imperative for AI

It won’t come as a surprise when I say that digital security has changed over the past few years. Remember when digital security used to be all about signature-based detection? It doesn’t ...
Information Security Professionals FI

Information Security Professionals – Today’s Unsung Heroes

Security teams work tirelessly every day to protect us from some very skilled cybercriminals. They face a very accomplished and persistent enemy that is bent on stealing our money, personal information, and ...
security systems Guard Dogs in the Cyber Realm

I don’t like dogs; I need a dog.

This is not a post about dogs, but about Internet security. For the record, I love dogs. For me, Will Rogers summed it up best. He said, “If there are no dogs ...
cyberwarfare

Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare

By Dr. Dennis Prange and edited by Andy Norton NOTE: This is part 3 of a 4-part series on Asynchronous Warfare. In part 1 of this blog series, we described the roots ...
Watering Hole Attacks FI

Five High-Profile Watering Hole Attacks Highlight Importance of Network Security

Digital criminals use various techniques to breach organizations’ computer systems. One method that continues to be popular among cybercriminals is watering hole attacks. The name is derived from how predatory animals tend ...
best hires FI

My Best Hires had 30% of “The Wrong Stuff”

For companies large and small, employees are the driving force behind every success. As managers, it should come as no surprise that who we select for our critical roles and assignments are ...
IoT security FI

Can Smart Lighting Beat a Hacker? How Machine Learning Can Boost IoT Security

It’s possible: Smart lighting could be the most dangerous element in your company’s network. By 2025, there will be 75 million IoT devices in use. Smart devices are now found throughout most ...
Asynchronous Warfare, Part 2: Strategy and Phases

Asynchronous Warfare, Part 2: Strategy and Phases

By Dr. Dennis Prange, edited by Andy Norton NOTE: This is part 2 of a 4-part series on Asynchronous Warfare. Please watch for other segments over the next several weeks. In part ...
Security Paranoia FI

Paranoia Reigns Among Security Pros

Technology, machines, software, UFOs, spontaneous combustion, and crop circles don’t scare me. I’m an engineer, a code writer, a builder, a closeted mathematician and part-Vulcan some might say. I’m also someone who’s ...