The Keystone of Modern Authentication in a Zero Trust World part 2 — How Safe Is Your Smartphone?

The Keystone of Modern Authentication in a Zero Trust World part 2 — How Safe Is Your Smartphone?

The Keystone of Modern Authentication in a Zero Trust World part 2 — How Secure Is Your Smartphone? Unveiling the Depths of Security & IntegrityIn our previous blog post, we delved into the pivotal ...

Top 7 cyber security measures that enterprises shouldn’t neglect

In an era dominated by digital connectivity, enterprises face unprecedented challenges in safeguarding their sensitive data and digital assets from an ever-evolving landscape of cyber threats. As the frequency and sophistication of ...
Cybersecurity Awareness Month Tips

Celebrating Cyber Security Awareness Month by Creating Awareness

Technology has made life easier not only for households but also for businesses. However, technology has also paved the way for cybercriminals to spread their roots and come up with new ways ...
Beyond Passwords: The Excalibur Vision for a Secure Digital Future

Beyond Passwords: The Excalibur Vision for a Secure Digital Future

In the ever-evolving landscape of cybersecurity, the age-old battle against unauthorized access continues. At the heart of this battle lies the humble password, a mechanism that has been both a shield and ...
GitHub vulnerabilities parallel research

GitHub vulnerabilities parallel research

illustrating GitHubLast month I came upon this article from Dark Reading. It looked very familiar. It didn’t take me long to realize that the GitHub cross-workflow artifact poisoning vulnerability discussed in the ...
digital transformation

Balancing Digital Transformation and Security

Charlene O’Hanlon and Andy Sealock from West Monroe discuss how IT teams can create a successful digital transformation paired with updated security protocols, and offer some examples of tactics successful companies implement ...
Security Boulevard
audits, cybersecurity audits, compliance, security, risk-based authentication, software audit API AuditBoard Adds Ability to Assess Third-Party Risks

How to Build a Security Awareness Training Program

With increased digitization of everything post-pandemic, cybersecurity has become a top concern for global CEOs with almost half planning to increase cybersecurity investment by 9%, according to PwC. Since 85% of breaches ...
Security Boulevard
prompt cyberattacks trust certifications remote work office cybersecurity awareness Cyber Aware With Micro-Learning

How Cybersecurity Awareness Shifted in 2021

The meaning of “cybersecurity awareness” changed in some pretty meaningful ways in 2021. Comprehensive employee security awareness training helps organizations to reduce risky behaviors, build a security-first internal culture and prevent cyberattacks ...
Security Boulevard
certifications cybersecurity Microsoft IBM SANS online cybersecurity education Educational

The New Wave of Cybersecurity Awareness Training

The only constant is change. The ongoing effects of COVID-19 have taught us that change is inevitable to survive. One major area that has been affected during COVID-19 is how we interact ...
Security Boulevard
supply chain GrammaTech third-party Hamas

More CEOs Ditching Social Media Over Security Concerns

New research from PWC finds almost half (48%) of CEOs in the UK are concerned enough about cyberattacks that they are shuttering their social media accounts. The report, the “23rd Annual Global ...
Security Boulevard