new normal

Assessing the New Normal for Cybersecurity

As work from home continues, cyberthreats related to the new normal will remain even post-pandemic “Pandemic” was the word of the year, with runners up including quarantine, coronavirus and asymptomatic. They make ...
Security Boulevard
privacy GRU

Inside the DoJ’s GRU Indictments for Cyber Meddling

For the third time in the past two years, the United States has indicted intelligence officers associated with Russia’s Main Intelligence Directorate (GRU), the military intelligence entity of the General Staff of ...
Security Boulevard
threat intelligence

Netskope Unveils Free Real-Time Threat Intelligence Exchange

Netskope today launched a Cloud Threat Exchange portal through which it will share threat intelligence with customers and partners for free. Company CTO Krishna Narayanaswamy said the Cloud Threat Exchange will automate ...
Security Boulevard
ransomware

Why Ransomware Isn’t Going Away Anytime Soon

 2019 was an extremely successful year for ransomware, rife with attacks and many high-profile victims. Of all the cyberthreats, ransomware was proven to be the most devastating. In the UK, it was ...
Security Boulevard
Qualys

7 Key Features of a Breach and Attack System

Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their perspective to help anticipate their next move. When you understand an attacker’s ...
Security Boulevard
encryption

Check Point Reveals Azure Cloud Security Flaw

Check Point Software Technologies revealed today its researchers were able to exploit a flaw to take over servers in the Microsoft Azure Cloud. The flaw in the Azure App Service used to ...
Security Boulevard
privacy GRU

DHS Cyber Agency Seeks Subpoena Authority to Obtain Cyber ‘Victim’ Info

On Dec. 12, senators Ron Johnson (R. Wis.) and Maggie Hassan (D. N.H.) introduced legislation that would grant DHS’ Cybersecurity and Infrastructure Security Agency (CISA) the authority to issue subpoenas to force ...
Security Boulevard
cybersecurity

Cybersecurity: Chernobyl and its Cyber Lessons

Looking at cybersecurity through the lens of a nuclear disaster can help your organization be more prepared when emergencies arise HBO’s recent “Chernobyl” series, which re-told the story of the nuclear accident ...
Security Boulevard
zero trust

Countdown to Zero: Why Zero Trust is in the Spotlight

In today’s expanding threat landscape, a zero-trust architecture is critical to protecting the enterprise “The best offense is a good defense” is a common adage in the sports world. After all, no ...
Security Boulevard
RDP attack

Ransomware, Phishing and Endpoint Attacks: The Top 3 Cyberthreats

Cyberthreats have been prevalent on the internet for decades now. Unfortunately, malware has been evolving more rapidly than the anti-malware software needed to combat it. The three most active cyberthreat categories worldwide ...
Security Boulevard