AI vulnerability

Deciphering Cybersecurity Vulnerabilities Requires Context

Cybersecurity context is the missing puzzle piece that can transform a jumble of information into a clear and coherent picture of vulnerabilities ...
Security Boulevard
AI, data, Auth0

AI Data Consumption and Analysis are a Cybersecurity Force Multiplier

Cybercriminals are creating smarter attacks using AI’s ability to increase its own knowledge as it consumes data. Data analysis can help ...
Security Boulevard
mobile cybersecurity

Phishing, Brute Force Attacks Rise in Expanded Threat Landscape

Phishing attacks and brute force attacks are on the rise as cybercriminals evolve their attacks to mobile and personal communication channels, according to a report from SaaS Alerts. On average, there were ...
Security Boulevard
cybersecurity Sysdig internet, security, cloud internet, vulnerabilites, organizations, DNSSEC, GoDaddy cloud network, security

The Internet Dilemma: Leveraging the Value While Reducing Vulnerabilities

Today, an organization’s brand and reputation are intrinsically tied to its data security and privacy protections. Years ago, we couldn’t foresee the potential impact of digital technology innovations on brand stability. Network ...
Security Boulevard

Guide: Rethinking application security risk for federal agencies

Cybersecurity risk can be hard to define and measure, even though the consequences of a cyberattack are very real. This post suggests a practical approach to determining and reducing application security risk ...
testing, PTaaS, API security, API, cloud, audits, testing, API security vulnerabilities testing BRc4 Akamai security pentesting ThreatX red team pentesting API APIs Penetration Testing

The Evolution of Vulnerability Scanning and Pentesting

An awareness of unprotected vulnerabilities and risks is the starting point for determining the best way to align resources with cybersecurity. By conducting regular real-world attack testing, security operations can illuminate weaknesses ...
Security Boulevard
insider risk Risky Insider Security Behaviors

Why Insider Threat Risk Increases in the Cloud 

As organizations move to the cloud, enterprise data is increasingly created, used and stored across a variety of SaaS and cloud-based service providers. While these services bring new efficiencies and, in some ...
Security Boulevard

Cybersecurity Risk’s “New Math”

Mary K. Pratt posted an article, “The new math of cybersecurity value,” on CSOonline on September 21, 2021, available at The new math of cybersecurity value | CSO Online   It is a ...
risk fatigue breach breaches risks

Orgs Brace for Breaches as IT Pros Battle Fatigue

The risk of cyberattacks has increased in the last year and 80% of global organizations report they are likely to experience a data breach that impacts customer data in the next 12 ...
Security Boulevard

Inadequate Cybersecurity

It is customary to begin an article on cybersecurity with statements about huge increases in threats and attacks and mounting cyberspace losses from fraud, identity theft, ransoms, data exfiltration, blackmail, etc. Few, ...