Resources - Tagged - Security Boulevard
Summer of Magecart

Summer of Magecart

| | Blog, Resources
As Summer ‘21 comes to an end, let’s take a look at some victims of these Magecart or Magecart-style attacks and learn how to prepare for the holiday shopping season that is ...

How behavioral biometrics can stop social engineering and malware scams dead in their tracks

Human fraud: how behavioral biometrics can stop social engineering and malware scams that traditional fraud tools miss. The post How behavioral biometrics can stop social engineering and malware scams dead in their tracks appeared first ...

How Credit Unions Can Stop Advanced Magecart Attacks. Period.

| | Blog, Resources
The ups and downs of the last year and a half have wreaked havoc on societal norms. It’s changed how we work out, socialize with our friends and family, celebrate life’s events, ...
Ally Bank Leaked Unencrypted Passwords to 3rd Parties.. Evades Questions

When You Need An Ally, Choose Source Defense

| | Blog, Resources
What could happen if I don’t cover my hands properly when I type in my debit card PIN code? Under normal circumstances, not much. The odds of someone knowing your PIN and ...

Working Well Together – Bots and Magecart

| | Blog, Resources
The security world is always looking for ways for innovative solutions to solve existing problems. Using artificial intelligence, machine learning, or prevention-first strategies are great ways to improve on solutions  that have ...
Source Defense is One of the First to Offer Critical Security Technology in the SecurityScorecard Integrate360° Marketplace

Source Defense is One of the First to Offer Critical Security Technology in the SecurityScorecard Integrate360° Marketplace

SecurityScorecard, a key Source Defense partner and the global leader in cybersecurity ratings, recently launched its Integrate360° Marketplace, the industry’s first ecosystem for cyber risk ratings. For the first time, security professionals ...
™

Cybersecurity Insiders – 2021 Malware Report

The post Cybersecurity Insiders - 2021 Malware Report appeared first on Digital Defense, Inc ...

6 Cloud Security Resources that You Should Be Using

It’s easy to get overwhelmed with the number of cloud security resources available. How do you know which sources to trust? Which ones should inform your security strategies? Which reports will actually ...

Microsoft Exchange Server Remote Code Execution (RCE) Vulnerability

The post Microsoft Exchange Server Remote Code Execution (RCE) Vulnerability appeared first on Digital Defense, Inc ...
TAG Cyber Evaluation: Frontline Vulnerability Manager™

TAG Cyber Evaluation: Frontline Vulnerability Manager™

| | Reports, Resources
The post TAG Cyber Evaluation: Frontline Vulnerability Manager™ appeared first on Digital Defense, Inc ...