testing

Our Threat Testing and BAS Papers Are Out!

With much excitement, we are announcing the release of our “magically awesome” ™ papers on security testing methods and Breach and Attack Simulation (BAS) technologies (Gartner GTP access required). Here they are: ...
Risky Insider Security Behaviors

3 Most Common and Risky Insider Security Behaviors

Too many organizations today turn a blind eye toward malicious and negligent insider behavior that puts their organizations at higher risk of fraud and cyberattacks. Those insider blinders are costing them hugely ...
Security Boulevard
Don’t give social media hackers a chance

Don’t give social media hackers a chance

Pranksters, malicious attackers, extremists — hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, ...
Deserialization Vulnerability Confirmed in Nexmo 3.4.0 SDK

Deserialization Vulnerability Confirmed in Nexmo 3.4.0 SDK

Nexmo has confirmed that their 3.4.0 SDK contained the Jackson-databind vulnerability that we announced earlier this week as widespread amongst SaaS SDKs.The deserialization vulnerability can be escalated into remote control execution (RCE) ...
Privacy Policies: The Realm Of The Legible Word Salad by Chris Boyd

Exploring the virtual worlds of advergaming

With a spot of tracking-related controversy ruffling feathers in gaming circles, now is a good time to become familiar with some of the advertising methods used for, and in, video games. Ladies ...
Smart Homes of Tomorrow – This Is Why We Can’t Have Nice Things

Smart Homes of Tomorrow – This Is Why We Can’t Have Nice Things

Privacy, vulnerability and reliability are the three main issues almost every connected device currently on the market faces, yet consumers are still choosing to automate their homes at an incredible rate. Currently ...

NIST updates cybersecurity framework

It’s been a long time coming. The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) recently released version 1.1 of the Framework for Improving Critical Infrastructure Cybersecurity, or affectionatey called ...
Federal CISO: Superhero Needed

Federal CISO: Superhero Needed

A famous leadership coach said, “Only Superman can leap tall buildings in a single bound, the rest of us must chip away at our goals one day at a time.” What a ...
Rogue WiFi Access Points: Would You Know the Difference?

Rogue WiFi Access Points: Would You Know the Difference?

/ / security
When traveling, at trade shows or when visiting a client or customer, a wireless access point (AP) can offer the most convenient way to connect to the web. And the most dangerous, ...
Small Security Budget

Making a Big Impact with a Small Security Budget

An excessive security budget isn’t the only way to build strong security Enterprises invest a lot of money into cybersecurity, yet still they get breached. We need look no further than Yahoo! ...
Security Boulevard
Loading...