Friday, August 12, 2022
  • Lowering Cyberinsurance Premiums with Managed Security Services
  • Threat Hunting
  • API Security Requires Everyone’s Support
  • Recall Warning: BlackDiamond PIEPS Beacon
  • Ransomware attack blamed for closure of all 7-Eleven stores in Denmark

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

CISOs

Why Cybersecurity Needs to be a Part of Your ESG

Nik Hewitt | August 9, 2022 | account takeover, CISOs, cyber insurance, Data Security, Digest, ESG Documentation, insider threats, Ransomware
What is an ESG? Environmental, social, and corporate governance (ESG) documentation is a way to visualize and evaluate how an organization is working for the betterment of social goals and how that ...
Blog
API security APIs Checkmarx access point

Cybersecurity Requires Decisive Action

Alex Pezold | August 17, 2021 | CISOs, Cybersecurity, data protection, Data Security
Corporate executives have a responsibility to ensure long-term positive outcomes for the companies they lead. One way to accomplish this is by minimizing corporate risk and protecting assets through proactive and innovative ...
Security Boulevard
How to stop your exposed API business logic from being breached

How to stop your exposed API business logic from being breached

Omer Primor | August 1, 2021 | API security, CISOs, Cybersecurity
This article was originally published in The Hacker News ...
Imvision Blog
Is your current approach to API security cutting it?

Is your current approach to API security cutting it?

Omer Primor | February 15, 2021 | API security, CISOs, Cybersecurity
There’s no way around it -- 2020 was the year of digital transformation. Recent research from IDC shows that spending on digital transformation was poised to grow by 10.4% in 2020 and ...
Imvision Blog
The SolarWinds Breach: It’s time for a Zero Trust approach to B2B partners

The SolarWinds Breach: It’s time for a Zero Trust approach to B2B partners

Sharon Mantin | January 5, 2021 | API security, CISOs, Cybersecurity
The SolarWinds breach wasn’t an ordinary attack. It was a highly sophisticated nation-state level attack that employed connected IT supply chains to infect thousands of organizations at once by compromising a service ...
Imvision Blog
18 API security resources that you can’t afford to miss

18 API security resources that you can’t afford to miss

Omer Primor | December 21, 2020 | API security, CISOs, Cybersecurity
  Everywhere we look, hackers are successfully breaching enterprise databases and hijacking sensitive data from billions of people around the world. That’s why CISOs and their teams, the individuals tasked with protecting ...
Imvision Blog

How CISOs Can Foster Effective Comms and Build a Cybersecurity Program

Mitch Parker | September 21, 2020 | CISOs, communication, Cyber Strategy, Featured Articles, IT Security and Data Protection
For many organizations, security flows from the top down. That’s a problem when executives don’t emphasize security as much as they should. Cisco learned as much in its CISO Benchmark Study “Securing ...
The State of Security

Is This Town Big Enough for Security AND Compliance?

ZeroNorth | September 10, 2020 | Application Security, AppSec, Blog, CISOs, Continuous Security, Cybersecurity, DEVOPS, DevSecOps, Digital Transformation, orchestration
In our final installment of a six-part series for CISOs who are looking to survive the “Wild West” of application security,… The post Is This Town Big Enough for Security AND Compliance? ...
Blog | ZeroNorth

Welcome to the Boomtown of Strong Application Security

ZeroNorth | September 4, 2020 | Application Security, AppSec, Blog, CISOs, Continuous Security, DevSecOps, Digital Transformation
Have you been following our blog series guiding CISOs through the “Wild West” of application security? This is our fifth… The post Welcome to the Boomtown of Strong Application Security appeared first ...
Blog | ZeroNorth

Why Secure DevOps is the New Sheriff in Town

ZeroNorth | August 4, 2020 | Application Security, AppSec, Blog, CISOs, Continuous Security, Cybersecurity, DEVOPS, DevSecOps, Digital Transformation
We’ve listened to the pain points of CISOs around the country, many of whom say managing an effective application security… The post Why Secure DevOps is the New Sheriff in Town appeared ...
Blog | ZeroNorth
Load more Loading...

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

Slack App Leaked Hashed User Passwords for 5 YEARS
Twilio Fails Simple Test — Leaks Private Data via Phishing
GitHub Zero-Day: From 35K Repos Compromised to False Alarm
API Security: A Complete Guide
The Fall of Passwords and the Rise of Analytics
SOC 2 Compliance: Q&A with Compliance and Security Expert David Carter
Ransomware attack blamed for closure of all 7-Eleven stores in Denmark
Balbix brings Snow and Ice to Vegas @ BlackHat 2022
Complete guide to IoT Security
Stand Down, Marketers: Zero Trust is Not a Product

Upcoming Webinars

Wed 17

Code Tampering: Four Keys to Pipeline Integrity

August 17 @ 1:00 pm - 2:00 pm
Mon 22

API Security

August 22 @ 1:00 pm - 2:00 pm
Wed 24

Implementing Identity Access Prioritization and Risk-Based Alerting for High-Fidelity Alerts

August 24 @ 1:00 pm - 2:00 pm
Tue 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

MiCODUS Car Trackers are SUPER Vulnerable and Dangerous
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Editorial Calendar Featured Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

MiCODUS Car Trackers are SUPER Vulnerable and Dangerous

July 21, 2022 Richi Jennings | Jul 21 0
How AI Secures the Future of Digital Payments
Application Security Cloud Security Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

How AI Secures the Future of Digital Payments

July 18, 2022 Natasha Lane | Jul 18 0
HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

June 17, 2022 Richi Jennings | Jun 17 Comments Off on HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

Top Stories

OCSF Promises to Advance Cybersecurity Data Sharing
Cloud Security Cybersecurity Data Security Featured Network Security News Security Awareness Security Boulevard (Original) Spotlight 

OCSF Promises to Advance Cybersecurity Data Sharing

August 11, 2022 Michael Vizard | Yesterday 0
Twilio Fails Simple Test — Leaks Private Data via Phishing
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Featured Governance, Risk & Compliance Identity & Access Incident Response Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Twilio Fails Simple Test — Leaks Private Data via Phishing

August 9, 2022 Richi Jennings | 2 days ago 0
GitHub Zero-Day: From 35K Repos Compromised to False Alarm
Application Security Cybersecurity Featured Incident Response Malware News Security Boulevard (Original) Spotlight Threat Intelligence Vulnerabilities 

GitHub Zero-Day: From 35K Repos Compromised to False Alarm

August 8, 2022 Gabriel Liechtman-Manor | 3 days ago 0

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.