security, tools, Permiso, cloud computing, Microsoft security report

Security Tools: First, They’re Good, Then They’re Bad

Security tools can also be vulnerable and so cybersecurity teams must put a premium on ensuring tools are used as intended for defense.  ...
Security Boulevard
defense, security, threat-informed defense

Defense in Depth is Broken – It’s Time to Rethink Cybersecurity 

| | AI, Cybersecurity, Defense
Breaking down why traditional defense-in-depth strategies fail and what security teams must do to truly outsmart attackers.  ...
Security Boulevard
Critical Cybersecurity Lessons from the Recent Exposure of U.S. Military Plans

Critical Cybersecurity Lessons from the Recent Exposure of U.S. Military Plans

 The recent inadvertent exposure of classified U.S. military plans by top defense and intelligence leaders serves as a stark reminder that even the most capable cybersecurity tools and well-defined policies can be ...

The Signal Chat Leak and the NSA

US National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a US attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service ...
fraud, e-commerce, Magecart web

AI-Driven eCommerce Fraud to Top $107 Billion by 2029

There has been a dramatic rise in e-commerce fraud as the increasing use of AI-generated deepfakes poses an unprecedented security challenge for online merchants ...
Security Boulevard
attacks, c-suite, digital, deception, deepfake, businesses, survey, attacks, deepfake, AI, security, deepfake, vishing, businesses, deepfake, misinformation, AI, deepfake technology

The Golden Age of Impersonation: The Dual Role of AI in Cyber Attacks & Cyber Defense    

Attacks today can be executed through a myriad of communication channels, including emails, social media and mobile applications.   ...
Security Boulevard
businesses, third-party, supply chain, vendor, fortification, defenses

Supply Chain Cyberattacks are on the Rise – Here’s How U.S. Businesses can Fortify Their Defenses 

The management of vendor and third-party risks is emerging as the number one challenge among U.S. information security professionals ...
Security Boulevard

Drones and the US Air Force

Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change. The F-35A certainly remains an important platform ...

Dream Job, or Is It?

In the summer of 2020, ClearSky, a venture capital and growth equity firm investing in innovative companies in the cybersecurity and sustainable energy sectors, investigated into a campaign dubbed "Dream Job," highly ...