ccpa

DHS Cyber Agency Seeks Subpoena Authority to Obtain Cyber ‘Victim’ Info

On Dec. 12, senators Ron Johnson (R. Wis.) and Maggie Hassan (D. N.H.) introduced legislation that would grant DHS’ Cybersecurity and Infrastructure Security Agency (CISA) the authority to issue subpoenas to force ...
Security Boulevard
cybersecurity

Cybersecurity: Chernobyl and its Cyber Lessons

Looking at cybersecurity through the lens of a nuclear disaster can help your organization be more prepared when emergencies arise HBO’s recent “Chernobyl” series, which re-told the story of the nuclear accident ...
Security Boulevard
zero trust

Countdown to Zero: Why Zero Trust is in the Spotlight

In today’s expanding threat landscape, a zero-trust architecture is critical to protecting the enterprise “The best offense is a good defense” is a common adage in the sports world. After all, no ...
Security Boulevard
ransomware

Ransomware, Phishing and Endpoint Attacks: The Top 3 Cyberthreats

Cyberthreats have been prevalent on the internet for decades now. Unfortunately, malware has been evolving more rapidly than the anti-malware software needed to combat it. The three most active cyberthreat categories worldwide ...
Security Boulevard
U.S. Army, Towson University Aim to Advance Intrusion Detection

U.S. Army, Towson University Aim to Advance Intrusion Detection

Researchers at the Army Research Lab (ARL) within the U.S. Army Combat Capabilities Development Command and Towson University are collaborating on an effort to make intrusion detection alerts more useful to cybersecurity ...
Security Boulevard
IBM Warns Retailers of Trojan Threat

IBM Warns Retailers of Trojan Threat

IBM has issued a cybersecurity advisory warning about an attack method originally developed for defraud banks that now is being applied to the retail sector. Limor Kessem, global executive security advisor for ...
Security Boulevard
ransomware

The Rise of Fileless Malware

Fileless malware that can evade traditional anti-virus programs means organizations must employ additional measures to monitor and secure their networks. From crypto-ransomware and destructive malware to advanced persistent threats that exploit zero-day ...
Security Boulevard
Malicious Insider Threat

Are You Prepared for a Malicious Insider Threat?

Earlier this month, Tesla became the poster child of the damage a single malicious insider can do to your company. Tesla CEO Elon Musk sent an email to employees about an employee ...
Security Boulevard
DDoS

Why Fileless Malware Will Continue Its Rapid Expansion

Fileless malware has received a lot of attention lately, and with good reason. In the last year, fileless malware, also commonly referred to as a zero-footprint attack, has successfully infiltrated a number ...
Security Boulevard
Ready for tax season phishing scams?

Ready for tax season phishing scams?

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take ...