data
Don’t Ignore Data Sovereignty
What does data sovereignty mean for organizations and what’s the best practice for ensuring compliance? ...
Security Boulevard
The Five Stages of Grief: Coping With a Data Breach
Have you been a victim of a data breach? You’re not alone. As an incident response (IR) professional, I have met many different types of corporate staff, from the IT staff to ...
Security Boulevard
Threat of Side-Channel Attacks Increases with Deep-Learning Model
The rapid innovations in deep learning, expanding use of laptops, and growing number of smartphones with microphones are creating an environment that makes it easier for bad actors to compromise the laptops ...
Security Boulevard
Understanding Generative AI Cybersecurity Risks
New generative AI use cases are as limitless as the technology itself—and so are the security and data privacy impacts. Despite warnings from scientists, tech luminaries and policymakers to proceed with caution, ...
Security Boulevard
On (Structured) Data
IntroductionThe offensive security industry is a curious one. On the one hand, we are ahead in various trends (or “thought leadership,” as some would have us term it) and are used to ...
Thales to Buy Imperva for $3.6 Billion in Latest Cybersecurity Deal
French multinational Thales, whose broad reach extends into such areas as defense, aerospace and transportation, is continuing a multi-year spending spree in cybersecurity with plans to buy U.S. data and application security ...
Security Boulevard
Passkeys Can Make Passwords a Thing of the Past
We all seem to have a love/hate relationship with passwords. Over time, we have learned to live with them–even when, time and again, they show how bad they are at securing our ...
Security Boulevard
Identity Security a Top Priority as Threats Evolve
The need to secure digital identities is one of the biggest privacy and data issues facing organizations today, and with less than half of organizations (49%) proactively investing in securing identities, there ...
Security Boulevard
Who Owns Security in Multi-Cloud Operations?
The best-kept secret is the one that is never shared. In today’s technology environment, that is even more true. Where organizations used to build and maintain their own technology stacks, now they ...
Security Boulevard
Identity Governance: Right People, Right Access, Right Time
Enterprise companies are increasing spending on software-as-a-service (SaaS) tools to enhance employee productivity and drive digital transformation projects. In doing so, IT teams are facing new challenges to ensure the right level ...
Security Boulevard