brand impersonation, brand fraud, SlashNext edge Using AI and ML to Win Against Fraud

Strengthening Trust in Your Brand With Better Communication and Monitoring

Brand impersonation and suboptimal experiences can diminish or eliminate your customers’ trust, especially if they lose money to fraud ...
Security Boulevard
collaboration telecom, threat actors

Does Your Security Team Need a Dedicated Collaboration Tool?

Investing in an IT- and/or security-specific collaboration platform ensures your team has tools that align with their IT and security requirements ...
Security Boulevard
Insights from 18 Years in Cybersecurity: Key Lessons for Success

The Three Keys to Success in Cybersecurity

In this episode, host Tom Eston shares the three key lessons he’s learned over his 18-year career in cybersecurity: effective communication, continuous learning, and empathy. He talks about the importance of understanding ...

Email and cybersecurity: Fraudsters are knocking

Can you remember your first email? Either sending one, or receiving it? I certainly remember explaining to people what email was, and I also remember someone telling me they could live without ...
Veeam data Rezilion Spring4Shell Log4j vulnerabilities time Kaseya ransomware recovery REvil

Ask Chloé: Response Time Etiquette

Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé offers advice to an InfoSec ...
Security Boulevard
Communication Side of Rapport Building

Communication Side of Rapport Building

Rapport. What is it? It is defined as “A relationship characterized by agreement, mutual understanding, or empathy that makes communication […] ...

Containment, Communication, and Remediation: The 3 Keys to a Breach Response

The number of U.S. data breaches reported in 2021 increased dramatically over the preceding year. As reported by the Identity Theft Resource Center (ITRC), there were 1,291 data breaches between January 1, ...
Zoom Monitoring with Tripwire Configuration Manager

Zoom Monitoring with Tripwire Configuration Manager

Last month, we covered how Tripwire Configuration Manager can audit your cloud service provider accounts like AWS, Azure, GCP, and other cloud-based services such as Salesforce. In this blog, we will continue our ...