Hacking - Tagged - Security Boulevard

The Misaligned Incentives for Cloud Security

Russia’s Sunburst cyberespionage campaign, discovered late last year, impacted more than 100 large companies and US federal agencies, including the Treasury, Energy, Justice, and Homeland Security departments. A crucial part of the ...
hacking cloud-native security

Supreme Court To Decide Scope of Federal Hacking Law

For more than 30 years, the federal computer hacking statute has been used by companies to sue employees (and former employees), competitors and even customers and users who violate their rules on ...
Security Boulevard
Colonial Pipeline Updates, DarkSide Goes Dark, Cybersecurity Best Practices

Colonial Pipeline Updates, DarkSide Goes Dark, Cybersecurity Best Practices

More news and updates about the Colonial Pipeline ransomware attack, the DarkSide ransomware as a service (RaaS) goes dark on the dark web, and why we still need cybersecurity best practices (regardless ...
The Colonial Pipeline Ransomware Attack

The Colonial Pipeline Ransomware Attack

This week Tom and Kevin discuss the Colonial Pipeline ransomware attack, RaaS (Ransomware as a Service), and why ransomware attacks are not going away anytime soon. ** Links mentioned on the show ...
Edward Snowden DESTROYS Ponzi Scheme Promoter LIVE

World Password Day, Tesla Hacking via Drone, Ipsos Screenwise Panel

Do we still need World Password Day? Hacking a Tesla via a drone, and a privacy warning about the Ipsos Screenwise panel. ** Links mentioned on the show ** World password day ...
The Role of Translation in Cyber Security and Data Privacy

The Role of Translation in Cyber Security and Data Privacy

Article by Shiela PulidoDue to our dependence on the internet for digital transformation, most people suffer from the risks of cyberattacks. It is an even greater concern this year due to the ...
Which is more Important: Vulnerability Scans Or Penetration Tests?

Which is more Important: Vulnerability Scans Or Penetration Tests?

Which Is Better? A Vulnerability Scan Or A Penetration Test?Vulnerability scanning and penetration tests are two very different ways to test your system for any vulnerabilities. Despite this, they are often confused ...
Malicious Life Podcast: Can Nuclear Power Plants Be Hacked?

Malicious Life Podcast: Can Nuclear Power Plants Be Hacked?

Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, dives into cybersecurity challenges for Nuclear facilities - how secure are modern nuclear power plants from cyber attacks? Check it out ...

When AIs Start Hacking

If you don’t have enough to worry about already, consider a world where AIs are hackers. Hacking is as old as humanity. We are creative problem solvers. We exploit loopholes, manipulate systems, ...
Malicious Life Podcast: Shutting Down the Internet in 30 Minutes

Malicious Life Podcast: Shutting Down the Internet in 30 Minutes

Chris Wysopal (aka WeldPond), cybersecurity pioneer and one of L0pht's founding members, talks about the group's 1998 testimony in the Senate, how they used shaming to force corporations to secure their software, ...