Guest Blog Post - Tagged - Security Boulevard
GUEST ESSAY: Why it’s worrisome that China has integrated Huawei switches into telecoms worldwide

GUEST ESSAY: Why it’s worrisome that China has integrated Huawei switches into telecoms worldwide

In the previous discussion, China’s 14th Five-Year Plan was summarized to capture relevant aspects of dual circulation, the Digital Silk Road (DSR), and the Belt Road Initiative (BRI) that aim to advance ...
GUEST POST: How China’s updated digital plans impacts U.S. security and diplomacy

GUEST POST: How China’s updated digital plans impacts U.S. security and diplomacy

In May 2021, China unveiled their updated Five-Year Plan to the world. This plan marks the 14th edition of their socioeconomic, political, and long-range objectives, and has set the tone for a ...
GUEST ESSAY: The Top 5 myths about SIEM –‘security information and event management’

GUEST ESSAY: The Top 5 myths about SIEM –‘security information and event management’

One of the most commonly repeated phrases in the security industry is, “Security teams hate their SIEM!” Related: The unfolding SIEM renaissance Security Information and Event Management (SIEM) is not what it ...
GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

While every business needs to prioritize cybersecurity, doing so is becoming increasingly complicated. With many employees now working remotely, securing company data isn’t as straightforward as it used to be. Things get ...
GUEST ESSAY: Who do you think impacts privacy, free markets more: Big Government or Big Tech?

GUEST ESSAY: Who do you think impacts privacy, free markets more: Big Government or Big Tech?

Proposed bipartisan legislation to modernize U.S. antitrust law and enforcement standards for the 21st century digital marketplace calls for a fact-driven comparison of Big-Tech’s unchecked power relative to Big Government’s Constitutionally limited power. Related: Apple vs ...
What is a Content Delivery Network (CDN)?

GUEST ESSAY: Why online supply chains remain at risk — and what companies can do about it

The Solarwinds hack has brought vendor supply chain attacks — and the lack of readiness from enterprises to tackle such attacks — to the forefront. Related: Equipping Security Operations Centers (SOCs) for ...
GUEST ESSAY: Data poverty is driving the growth of cybercrime – here’s how to reverse the trend

GUEST ESSAY: Data poverty is driving the growth of cybercrime – here’s how to reverse the trend

Data poverty is real and it’s coming for your user accounts. Related: Credential stuffing soars due to Covid-19 The current state of data in cybersecurity is a tale of The Haves and ...
GUEST ESSAY: A full checklist on how to spot pharming attacks — and avoid becoming a victim

GUEST ESSAY: A full checklist on how to spot pharming attacks — and avoid becoming a victim

Cybercriminals use various techniques for conducting cyberattacks. One such popular way to infiltrate a system is Pharming. It is an online scam attack quite similar to Phishing. Related: Credential stuffing explained The ...
GUEST ESSAY: 3 sure steps to replace legacy network security systems — in a measured way

GUEST ESSAY: 3 sure steps to replace legacy network security systems — in a measured way

Keeping up with the pace of technology, information, and the evolving threat landscape is a challenge for all enterprises. Related: DHS launches 60-day cybersecurity sprints To make matters more difficult, implementing new ...
GUEST ESSAY: ‘Identity Management Day’ highlights the importance of securing digital IDs

GUEST ESSAY: ‘Identity Management Day’ highlights the importance of securing digital IDs

The second Tuesday of April has been christened “Identity Management Day” by the Identity Defined Security Alliance, a trade group that provides free, vendor-neutral cybersecurity resources to businesses. Related: The role of ...