Naming Conventions

Breaking the Chain of Data Access: The Importance of Separating Human and Application Users

Data, the lifeblood of any organization, relies on the database as its beating heart. As a result, businesses invest heavily in designing and monitoring all access to it. In traditional literature, there ...
Azure Responsibility Matrix

Baffle’s Proxy Architecture

Baffle implements database encryption and role-based access control using a reverse proxy configuration that operates at the SQL session layer. This blog will explore what that means and compare it to competing ...

CIS Control 3: Data Protection

For many years, there was a wide misunderstanding that encrypting some data is equivalent to protecting that data. If it’s encrypted, so the thinking goes, nobody else could access it, and it ...
Ubiquiti data breach that compromised PII of its customers when attackers gained access to the root account, where they could do anything.

Major Provider of Cloud IoT Devices Breached

Ubiquiti, a global IoT device vendor, suffered a major data breach involving the PII of its customers. The post Major Provider of Cloud IoT Devices Breached appeared first on Sonrai Security ...
identity cyberattacks ransomware

When Do You ‘Exceed’ Your Authorization to Use Computer Data?

The law is murky on what constitutes legal authorization and use of computer data In Greek mythology, Cassandra was cursed with the ability to know the future, and with the inability to ...
Security Boulevard
breach

Is a Ransomware Attack a Reportable Data Breach?

| | data access, Data breach, ddos
One question that vexes security engineers, incident responders and lawyers is whether a ransomware attack constitutes a reportable data breach under any of the various data breach disclosure laws, regulations or other ...
Security Boulevard

The Importance of Implementing an Information Security Policy That Everyone Understands

Information security (IS) and/or cybersecurity (cyber) are more than just technical terms. They’re the processes, practices and policy that involve people, services, hardware, and data. In particular, IS covers how people approach ...
cyber AI, AI attacks, cybersecurity, defense, organization

Access Governance Helps Ensure Network Security Compliance

Protecting your company’s priceless data means making sure of two things: that the right people have access to the correct files and applications, and that the wrong people don’t have access to ...
Security Boulevard

Understanding Single Sign On as a Means of Identity Access Management

I usually spend my mornings doing some reading and enjoying my coffee. On this one particular morning, I noticed that I had received an email from a gaming company I had created ...
PII Microsoft Koverse data protection impact assessment DPIA Dell AWS data protection cybersecurity

Best of 2019: Privacy Regs Changing the Face of Cybersecurity

As we close out 2019, we at Security Boulevard wanted to highlight the five most popular articles of the year. Following is the second in our weeklong series of the Best of ...
Security Boulevard

Secure Guardrails