ZTNA, migrating, backup data, zero-trust, security, zero-trust, business, policy container zero-trust ZTNA

Zero-Trust Network Access: Why so Many Teams Get it Wrong

Zero-trust encompasses a variety of technologies, from strong identity systems to microsegmentation. Why are so many organizations getting it wrong? ...
Security Boulevard
How Your Car Shares Data with Insurers & TikTok Ban Impact

The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update

In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by ...

The Importance of Compliance Hardening

Navigating compliance hardening: A critical pillar of organizational cybersecurity Safeguarding digital assets against ever-evolving threats demands not just vigilance but a proactive stance towards compliance hardening. This approach ensures that systems are ...
Newly updated Smart SOAR Playbook Editor Interface showcasing a modern design for optimized user interaction

What it’s Like Using Integrations Built by D3

Integrating a variety of cybersecurity tools and platforms is often a complex and demanding task. This process, essential to the effective deployment of Security Orchestration, Automation and Response (SOAR), involves more than ...
Microsoft AI cybersecurity

Microsoft Preps AI-Based Copilot for Security for April 1 Release

Microsoft for more than a year has been infusing generative AI capabilities throughout much of its product and services portfolio – such as Microsoft 365 and Bing – through its Copilot initiative, ...
Security Boulevard
brand impersonation, brand fraud, SlashNext edge Using AI and ML to Win Against Fraud

Strengthening Trust in Your Brand With Better Communication and Monitoring

Brand impersonation and suboptimal experiences can diminish or eliminate your customers’ trust, especially if they lose money to fraud ...
Security Boulevard

Crypto Phishing Kit Impersonating Login Pages: Stay Informed

In the ever-evolving landscape of cybersecurity, a fresh menace has emerged, targeting crypto enthusiasts through a sophisticated phishing kit. This crypto phishing kit, part of an elaborate attack scheme dubbed CryptoChameleon, is ...
The Evolving Threat Landscape: Why AI is Essential for Cybersecurity Success

The Evolving Threat Landscape: Why AI is Essential for Cybersecurity Success

This week, we’re looking into how the rise of artificial intelligence (AI) has significantly altered the threat landscape, introducing challenges and opportunities for organizations seeking to safeguard their data and infrastructure ...
GRIT Ransomware Report: February 2024

GRIT Ransomware Report: February 2024

Additional contributors to this report: Nic Finn, Jason Baker, Justin Timothy, Ryan Silver February 2024 was an utterly chaotic month […] ...

CVE-2024-21412 Vulnerability Reported in Defender SmartScreen

Guarding against SmartScreen bypass (CVE-2024-21412) and DarkGate malware campaign A recent surge in cyberattacks has seen malevolent actors exploiting a vulnerability in Windows Defender SmartScreen, a critical security feature designed to protect ...