Tuesday, June 24, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

air gap

AI, risk, IT/OT, security, catastrophic, cyber risk, catastrophe, AI risk managed detection and response

AI Could Help Resolve IT/OT Integration Security Challenges

Nathan Eddy | September 20, 2024 | AI, air gap, cisco, integration, IT, OT, security
Security issues stemming from the integration of information technology (IT) and operational technology (OT), could be addressed through artificial intelligence (AI), although the technology could also be leveraged by malicious actors, according ...
Security Boulevard

Cybersecurity Lessons from the Pandemic: Avoidance

C. Warren Axelrod | November 2, 2020 | air gap, avoidance, Contingency Planning, COVID-19, General, Pandemic, Risk Analysis, Spotlight, Y2K
There are a number of confusing differences of opinion with respect to handling the COVID-19 pandemic. Some of the confusion seems to center around a common misunderstanding of the roles of various ...
BlogInfoSec.com
cybersecurity skills air gapping Russia GolenJackal

Using SaaS Backup and Recovery to Protect Your Data With a Virtual Air Gap

David Ngo | September 15, 2020 | air gap, backup and recovery, data protection, SaaS
Organizations find themselves in a quandary these days when it comes to whether they should deploy an air-gap strategy—a strategy in which secondary backup data is saved in an offsite and offline ...
Security Boulevard

To Air-Gap or Not Air-Gap Industrial Control Networks

Gary DiFazio | June 17, 2019 | air gap, ICS, ICS Security
What is air-gapping, and why do we air-gap networks? What camp are you in? In the camp that believes in air-gaps, or the other set that says they truly do not exist? ...
The State of Security
NFCdrip: Data Exfiltration Research in Near Field Communication

NFCdrip: Data Exfiltration Research in Near Field Communication

Pedro Umbelino | December 14, 2018 | air gap, air gapping, air-gapped systems, Blog, data exfiltration, near field communication, NFC, NFC radio, NFC range, NFCdrip, Technical Blog
Near-field communication (NFC) is a set of protocols that enables two electronic devices to establish communication by bringing them very close together. Usually the devices must be within less than 4cm. Contactless ...
Blog – Checkmarx
A Practical Way to Use NFC Data to Exfiltrate Data

Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Haidee LeClair | October 18, 2018 | air gap, air gapping, air-gapped systems, android, Android's NFC design, Attack Surface, Blog, data exfiltration, Data Leaks, near field communication, NFC, NFC frequency, NFC radio, NFCdrip, RFID, Technical Blog, vulnerable IoT objects
Air-gapping means physically isolating a secure computer from unsecured networks, such as the public Internet or an unsecured local area network. The concept of air-gapping represents just about the maximum protection one ...
Blog – Checkmarx

Securing Apps When User Devices Are Compromised

Kimberly Becan | October 4, 2018 | air gap, app team, application, network segmentation, Protected App, zero trust
Corporate networks and user PCs continue to be exploited—leaving your sensitive applications and data vulnerable. Network segmentation is a fundamental way to mitigate the risks associated with these vulnerabilities—but it only works ...
Bromium

Introducing Bromium Protected App®: Protect Critical Applications Against Compromised Devices

Kimberly Becan | July 31, 2018 | air gap, network segmentation, Product News, Protected App, Virtualization, zero trust
Protected App locks down access to and from your sensitive data, keeping it secure even if networks and host PCs have been compromised Using hardware-enforced virtualization-based security, Bromium Protected App protects against ...
Bromium
TV Air Gap Technology

What Your Favorite TV Shows Get Right (and Hilariously Wrong) About Air Gap Technology

Brett Hansen | February 12, 2018 | air gap, cyberthreats, Networks
Chances are, one of the first places you may have heard about an air gap computer was on TV. Olivia Pope on “Scandal” knows what air gap technology is. Elliot on “Mr ...
Security Boulevard

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Google’s $32 Billion Acquisition of Wiz Draws DoJ Antitrust Probe: Report
US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat
Is Your CISO Ready to Flee? 
Scattered Spider Targets Aflac, Other Insurance Companies
Your passwords are everywhere: What the massive 16 billion login leak means for you
Understanding EchoLeak: What This Vulnerability Teaches Us About Application Security | Impart Security
The $4.88 Million Question: Why Password-Based Breaches Are Getting More Expensive
Cybersecurity Snapshot: Tenable Report Spotlights Cloud Exposures, as Google Catches Pro-Russia Hackers Impersonating Feds
Unpacking the Verizon 2025 Data Breach Investigations Report

Industry Spotlight

Scattered Spider Targets Aflac, Other Insurance Companies
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence 

Scattered Spider Targets Aflac, Other Insurance Companies

June 22, 2025 Jeffrey Burt | 1 day ago 0
US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency
Analytics & Intelligence Blockchain Cyberlaw Cybersecurity Data Privacy Digital Currency Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

US Pig Butchering Victims ‘Will’ Get Refunds — Feds Seize $225M Cryptocurrency

June 20, 2025 Richi Jennings | 3 days ago 0
Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks
Blockchain Cloud Security Cybersecurity Data Security Digital Currency Featured Identity & Access Incident Response Industry Spotlight Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Iran Reduces Internet Access After Israeli Airstrikes, Cyberattacks

June 18, 2025 Jeffrey Burt | Jun 18 0

Top Stories

DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs
AI and Machine Learning in Security AI and ML in Security Cybersecurity Featured Governance, Risk & Compliance News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

DataKrypto and Tumeryk Join Forces to Deliver World’s First Secure Encrypted Guardrails for AI LLMs and SLMs

June 24, 2025 John D. Boyle | 38 minutes ago 0
16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches 

16 Billion Leaked Records May Not Be a New Breach, But They’re a Threat

June 22, 2025 Jeffrey Burt | 2 days ago 0
AWS Raises Expertise Bar for MSSP Partners
AI and Machine Learning in Security Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

AWS Raises Expertise Bar for MSSP Partners

June 22, 2025 Michael Vizard | 2 days ago 0

Download Free eBook

Managing the AppSec Toolstack

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×