IT Security

Don’t Lock Up Peanut Butter in Fort Knox: The Smart Approach to Data Classification
Greg Neville | | Cybersecurity, Data Classification, data disposal, data handling, Data Security, IT Security, risk management
Exploring the implementation of a data classification model in order to enable a data-driven approach to managing risk and cost ...
Security Boulevard

CISOs Look to Establish Additional Leadership Roles
According to an IANS survey of more than 800 CISOs, roles such as business information security officers (BISOs), chiefs of staff and heads for privacy, program management and data protection are among ...
Security Boulevard

Hackers Exploit DocuSign APIs for Phishing Campaign
Cybercriminals are exploiting DocuSign’s APIs to send highly authentic-looking fake invoices, while DocuSign’s forums have reported a rise in such fraudulent campaigns in recent months. Unlike typical phishing scams that rely on ...
Security Boulevard

CISA Strategic Plan Targets Global Cooperation on Cybersecurity
The Cybersecurity and Infrastructure Security Agency (CISA) introduced its inaugural international strategic plan, a roadmap for strengthening global partnerships against cyber threats ...
Security Boulevard

Spooky Spam, Scary Scams: Halloween Threats Rise
Halloween-themed spam has risen sharply this season, with Bitdefender reporting that 40% of these emails contain malicious content designed to scam users or harvest personal data. In the first half of October ...
Security Boulevard

Majority of SaaS Applications, AI Tools Unmanaged
Unmanaged software as a service (SaaS) applications and AI tools within organizations are posing a growing security risk as vulnerabilities increase, according to a report from Grip Security ...
Security Boulevard

API Vulnerabilities Jump 21% in Third Quarter
Application programming interface (API) vulnerabilities surged 21% in the third quarter, with cloud-native infrastructure increasingly targeted by cybercriminals, according to Wallarm’s Q3 2024 API ThreatStats report ...
Security Boulevard

Survey Surfaces Depth and Scope of Identity Management Challenge
A survey of 510 IT security and risk practitioners finds 93% have access to a comprehensive inventory of human and non-human identities across their IT environments, with 85% having a clear line ...
Security Boulevard

CIOs Sound Alarm on Network Security in AI Era
The increasing integration of AI and bandwidth-heavy applications is complicating network environments and making them a greater focus for C-suite leaders, according to a report by Extreme Networks ...
Security Boulevard

iPhone Mirroring Flaw Could Expose Employee Personal Information
A flaw in Apple's mirroring feature within the iOS 18 and macOS Sequoia software updates compromises personal privacy when used on work Macs, according to a report from Sevco Security ...
Security Boulevard