cybersecurity

Cybersecurity: Chernobyl and its Cyber Lessons

Looking at cybersecurity through the lens of a nuclear disaster can help your organization be more prepared when emergencies arise HBO’s recent “Chernobyl” series, which re-told the story of the nuclear accident ...
Security Boulevard
zero trust

Countdown to Zero: Why Zero Trust is in the Spotlight

In today’s expanding threat landscape, a zero-trust architecture is critical to protecting the enterprise “The best offense is a good defense” is a common adage in the sports world. After all, no ...
Security Boulevard
Log4j RDP attack

Ransomware, Phishing and Endpoint Attacks: The Top 3 Cyberthreats

Cyberthreats have been prevalent on the internet for decades now. Unfortunately, malware has been evolving more rapidly than the anti-malware software needed to combat it. The three most active cyberthreat categories worldwide ...
Security Boulevard
U.S. Army, Towson University Aim to Advance Intrusion Detection

U.S. Army, Towson University Aim to Advance Intrusion Detection

Researchers at the Army Research Lab (ARL) within the U.S. Army Combat Capabilities Development Command and Towson University are collaborating on an effort to make intrusion detection alerts more useful to cybersecurity ...
Security Boulevard
Magecart web

IBM Warns Retailers of Trojan Threat

IBM has issued a cybersecurity advisory warning about an attack method originally developed for defraud banks that now is being applied to the retail sector. Limor Kessem, global executive security advisor for ...
Security Boulevard
Microsoft ransomware

The Rise of Fileless Malware

Fileless malware that can evade traditional anti-virus programs means organizations must employ additional measures to monitor and secure their networks. From crypto-ransomware and destructive malware to advanced persistent threats that exploit zero-day ...
Security Boulevard
threat Russia Russian critical infrastructure APTs

Are You Prepared for a Malicious Insider Threat?

Earlier this month, Tesla became the poster child of the damage a single malicious insider can do to your company. Tesla CEO Elon Musk sent an email to employees about an employee ...
Security Boulevard
backup Malware

Why Fileless Malware Will Continue Its Rapid Expansion

Fileless malware has received a lot of attention lately, and with good reason. In the last year, fileless malware, also commonly referred to as a zero-footprint attack, has successfully infiltrated a number ...
Security Boulevard
Ready for tax season phishing scams?

Ready for tax season phishing scams?

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take ...
Mitigating Cyber Risks Technology

Mitigating Cyber-Risks in Everyday Technology Use

The various applications, devices and networks in use across the world have now become so intertwined that it’s hard to keep them separate. The cloud allows users to access data and information ...
Security Boulevard