Friday, May 30, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

cars

DonkeyHotey (cc:by-sa)

Allstate Violates Drivers’ Privacy, Texas AG Alleges

Richi Jennings | January 15, 2025 | Allstate, android spyware, Arity, automaker, Car, cars, cellular IoT, cellular IoT security, Chrysler, Connected Cars, Consumer IoT, Dodge, Fiat, Fuel Rewards, GasBuddy, insurance, Insurance Companies, insurance company, Internet of things, Internet of Things (IoT), Internet of Things (IoT) Security, Internet of Things cyber security, iOS spyware, iot, Jeep, Lexus, Life360, Maserati, Mazda, Mozilla, Mozilla Foundation, New Cars, Privacy, Privacy4Cars, ram, Routely, SB Blogwatch, spyware, Stellantis, Texas Data Privacy and Security Act, Toyota, vehicle, vehicle cybersecurity, vehicle OTAs
Don’t Mess With Texas Privacy: “We will hold all these companies accountable,” rants state attorney general Ken Paxton (pictured) ...
Security Boulevard
Digital License Plate Vulnerabilities and How to Avoid New Text Message Scams

Digital License Plate Vulnerabilities, How to Avoid New Text Message Scams

Tom Eston | December 23, 2024 | cars, Cyber Security, cyber threat, Cybersecurity, Data Privacy, digital license plate, Digital Privacy, driving, Episodes, Fraud, Information Security, Infosec, license, License Plate, Mobile, mobile phone, Number Warming, Phishing, Podcast, Podcasts, Privacy, Scams, security, Smart Phone, social engineering, technology, Text Message, text message scam, Weekly Edition
In this episode Tom, Scott, and Kevin discuss the vulnerabilities of digital license plates and the potential for hackers to exploit them. They explain what digital license plates are and how they ...
Shared Security Podcast

Friday Squid Blogging: Safe Quick Undercarriage Immobilization Device

Bruce Schneier | December 6, 2024 | cars, law enforcement, squid, Uncategorized
Fifteen years ago I blogged about a different SQUID. Here’s an update: Fleeing drivers are a common problem for law enforcement. They just won’t stop unless persuaded­—persuaded by bullets, barriers, spikes, or ...
Schneier on Security
Hacking Kia: Shocking Web Portal Vulnerability Discovered! Plus, NIST Password Updates!

Kia Security Flaw Exposed, NIST’s New Password Guidelines

Tom Eston | October 7, 2024 | Authentication, biometrics, cars, Connected Cars, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Hacking, Information Security, Infosec, Kia, MFA, Multi-Factor Authentication, NIST, Password, password complexity, Password Guidelines, Password Policy, Password reset, Password Resets, passwords, Podcast, Podcasts, Privacy, security, technology, web application, web application vulnerability, Weekly Edition
In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The ...
Shared Security Podcast

Providing Security Updates to Automobile Software

Bruce Schneier | July 30, 2024 | books, cars, Cybersecurity, software, Uncategorized
Auto manufacturers are just starting to realize the problems of supporting the software in older models: Today’s phones are able to receive updates six to eight years after their purchase date. Samsung ...
Schneier on Security

New Attack Against Self-Driving Car AI

Bruce Schneier | May 10, 2024 | academic papers, Artificial Intelligence, cars, cyberattack, side-channel attacks, Uncategorized
This is another attack that convinces the AI to ignore road signs: Due to the way CMOS cameras operate, rapidly changing light from fast flashing diodes can be used to vary the ...
Schneier on Security

Cheating Automatic Toll Booths by Obscuring License Plates

Bruce Schneier | March 20, 2024 | cars, cheating, Uncategorized
The Wall Street Journal is reporting on a variety of techniques drivers are using to obscure their license plates so that automatic readers can’t identify them and charge tolls properly. Some drivers ...
Schneier on Security
25.6 Million Dollar Deepfake Scam, Exploring Canada's Flipper Zero Ban

25.6 Million Dollar Deepfake Scam, Exploring Canada’s Flipper Zero Ban

Tom Eston | February 19, 2024 | AGI, AI, canada, Canadian Government, Car Thefts, cars, Cyber Security, Cybersecurity, Data Privacy, deepfake, deepfakes, Digital Privacy, Episodes, Flipper Zero, Information Security, Infosec, Podcast, Podcasts, Privacy, scam, Scams, security, Stolen Cars, technology, Thefts, Weekly Edition
In episode 317, Tom and Kevin discuss a reported deepfake scam that allegedly led to the theft of 25.6 million from a multinational company and Canada’s attempt to ban the Flipper Zero ...
Shared Security Podcast
Unlocking the Secrets: Why Your Car Could Be a Privacy Nightmare! 🚗🕵️ | Must-Know Tips!

Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again

Tom Eston | October 9, 2023 | Automotive, Car Privacy, Car security, cars, clop, clop-ransomware, Cyber Security, Cybersecurity, Data breach, Data Broker, Data Brokers, Data Collection, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Mozilla, Password, password complexity, Password Creation, passwords, Podcast, Podcasts, Privacy, Ransomware, research, security, Sony, surveillance, technology, Weekly Edition
In this episode, we discuss the Mozilla Foundation’s alarming report that reveals why cars are the top privacy concern. Modern vehicles, equipped with data-collecting tech, pose significant risks to consumers’ privacy, with ...
Shared Security Podcast
Future-Proofing Your Career: Navigating AI in the Workplace | Is Your Job at Risk?

Is My Boss Spying on Me, Instagram Painting Scam, Kia and Hyundai TikTok Challenge

Tom Eston | October 2, 2023 | AI, Car theft, Car Thefts, cars, Cyber Security, cybercriminals, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Hyundai, Hyundai Challenge, Information Security, Infosec, Instagram, Kia, Kia and Hyundai Challenge, Kia Challenge, Painting Scam, Podcast, Podcasts, Privacy, scam, Scams, security, social media, surveillance, technology, TikTok, Viral, Weekly Edition, Workplace, Workplace Surveillance
In this episode, we explore the growing trend of AI surveillance in corporations, where cutting-edge technology is used to monitor employees, optimize productivity, and raise ethical concerns. Next, we uncover a disturbing ...
Shared Security Podcast
Load more Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Security Field Day

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

RSA and Bitcoin at BIG Risk from Quantum Compute
Unsophisticated Actors, Poor Hygiene Prompt CI Alert for Oil & Gas 
Understanding the Importance of Incident Response Plans for Nonprofits
FTC Orders GoDaddy to Bolster its Security After Years of Attacks
Mental Denial of Service: Narrative Malware and the Future of Resilience
When AI Fights Back: Threats, Ethics, and Safety Concerns
Massive Data Breach Exposes 184 Million Login Credentials
OTP Authentication in 2025: How MojoAuth Stacks Up Against Twilio Verify, Auth0, Stytch & Descope
Building a Secure LLM Gateway (and an MCP Server) with GitGuardian & AWS Lambda
Google Boosts LiteRT and Gemini Nano for On-Device AI Efficiency

Industry Spotlight

Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers

May 29, 2025 Jeffrey Burt | Yesterday 0
Microsoft Opens Windows Update to 3rd-Party Apps
Application Security Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

Microsoft Opens Windows Update to 3rd-Party Apps

May 29, 2025 Richi Jennings | Yesterday 0
RSA and Bitcoin at BIG Risk from Quantum Compute
Analytics & Intelligence Blockchain CISO Suite Cloud Security Cybersecurity Data Privacy Data Security DevOps Digital Currency Featured Governance, Risk & Compliance Humor Industry Spotlight Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

RSA and Bitcoin at BIG Risk from Quantum Compute

May 27, 2025 Richi Jennings | 2 days ago 0

Top Stories

FTC Orders GoDaddy to Bolster its Security After Years of Attacks
Application Security Cloud Security Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

FTC Orders GoDaddy to Bolster its Security After Years of Attacks

May 28, 2025 Jeffrey Burt | 1 day ago 0
U.S. Authorities Seize DanaBot Malware Operation, Indict 16
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Malware Network Security News Security Boulevard (Original) Spotlight Threats & Breaches 

U.S. Authorities Seize DanaBot Malware Operation, Indict 16

May 23, 2025 Jeffrey Burt | May 23 0
Survey Surfaces Limited Amount of Post Quantum Cryptography Progress
Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Survey Surfaces Limited Amount of Post Quantum Cryptography Progress

May 23, 2025 Michael Vizard | May 23 0

Download Free eBook

The Dangers of Open Source Software and Best Practices for Securing Code

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×

Security in AI

Step 1 of 7

14%
How would you best describe your organization's current stage of securing the use of generative AI in your applications?(Required)
Have you implemented, or are you planning to implement, zero trust security for the AI your organization uses or develops?(Required)
What are the three biggest challenges your organization faces when integrating generative AI into applications or workflows? (Select up to three)(Required)
How does your organization secure proprietary information used in AI training, tuning, or retrieval-augmented generation (RAG)? (Select all that apply)(Required)
Which of the following kinds of tools are you currently using to secure your organization’s use of generative AI? (select all that apply)(Required)
How valuable do you think it would it be to have a solution that classifies and quantifies risks associated with generative AI tools?(Required)
What are, or do you think would be, the most important reasons for implementing generative AI security measures? (Select up to three)(Required)

×