Don’t Ignore Data Sovereignty

What does data sovereignty mean for organizations and what’s the best practice for ensuring compliance? ...
Security Boulevard
NetApp data broker FTC location data

The Five Stages of Grief: Coping With a Data Breach

Have you been a victim of a data breach? You’re not alone. As an incident response (IR) professional, I have met many different types of corporate staff, from the IT staff to ...
Security Boulevard
mobile cybersecurity

Threat of Side-Channel Attacks Increases with Deep-Learning Model

The rapid innovations in deep learning, expanding use of laptops, and growing number of smartphones with microphones are creating an environment that makes it easier for bad actors to compromise the laptops ...
Security Boulevard
Androxgh0st macOS malware cracked software trojan

Understanding Generative AI Cybersecurity Risks

New generative AI use cases are as limitless as the technology itself—and so are the security and data privacy impacts. Despite warnings from scientists, tech luminaries and policymakers to proceed with caution, ...
Security Boulevard
On (Structured) Data

On (Structured) Data

IntroductionThe offensive security industry is a curious one. On the one hand, we are ahead in various trends (or “thought leadership,” as some would have us term it) and are used to ...
cybersecurity acquisition

Thales to Buy Imperva for $3.6 Billion in Latest Cybersecurity Deal

French multinational Thales, whose broad reach extends into such areas as defense, aerospace and transportation, is continuing a multi-year spending spree in cybersecurity with plans to buy U.S. data and application security ...
Security Boulevard
passwordless, passwordless authentication, future, passwords, passkeys, 1Password passwordless credential stuffing Password We Still Use Bad Passwords

Passkeys Can Make Passwords a Thing of the Past

We all seem to have a love/hate relationship with passwords. Over time, we have learned to live with them–even when, time and again, they show how bad they are at securing our ...
Security Boulevard
AI, identity, FraudGPT identity, risk, CrowdStrike digital identitiies Identity Theft Financial Fraud Digital Age

Identity Security a Top Priority as Threats Evolve

The need to secure digital identities is one of the biggest privacy and data issues facing organizations today, and with less than half of organizations (49%) proactively investing in securing identities, there ...
Security Boulevard
CSPM, cloud-based, Wiz multi-cloud, security, CNAPP cloud computing cybersecurity Orca Kubernetes TDIR cloud and container security

Who Owns Security in Multi-Cloud Operations?

The best-kept secret is the one that is never shared. In today’s technology environment, that is even more true. Where organizations used to build and maintain their own technology stacks, now they ...
Security Boulevard
identity governance security Spera deepfake identity management

Identity Governance: Right People, Right Access, Right Time

Enterprise companies are increasing spending on software-as-a-service (SaaS) tools to enhance employee productivity and drive digital transformation projects. In doing so, IT teams are facing new challenges to ensure the right level ...
Security Boulevard

Secure Guardrails