security
How to Mitigate Threats to a Content Delivery Application
Nik Hewitt | | application protection, applications, Best Practices, Cybersecurity, next gen security, security, Security Research
Learn the top 9 ways to stop cybersecurity threats to your content delivery application A content delivery application is a software or system that efficiently distributes various digital content to end-users. Its ...
First Ban on Selling Location Data, Prohibiting Password Managers, Real-Time Crime Center Concerns
Tom Eston | | Credential Storage, crime, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Digital Stalking, Episodes, External Password Managers, Information Security, Infosec, Location Shield Act, location tracking, Massachusetts, national security, password managers, passwords, Podcast, Podcasts, police, policing, Privacy, Real-Time Crime Centers, RTCC, security, Stalking, surveillance, technology, Weekly Edition
In this episode we discuss how Massachusetts lawmakers are pushing a groundbreaking bill to ban the buying and selling of location data from mobile devices. This legislation raises vital questions about consumer ...
How to Detect Lateral Movement and Three Ways to Prevent It
Bruce Lynch | | advice, anlaysis, Cybersecurity, lateral movement, microsegmentation, security, Security Research, service account protection, service accounts, TrueFort, zero trust
Learn what you can do to detect lateral movement and prevent lateral movement attack After gaining access to an organization’s network, cybercriminals use lateral movement to escalate privileges, exploit vulnerabilities, and other ...
Leading German Digital Gaming Platform Stops Fake Account Creation and Pilferage with Radware Bot Manager
As the online gaming industry steadily grows (overtaking the global film industry in revenue a few years ago), so do the types of bot attacks plaguing them in ever-increasing numbers. The post ...
AI’s Impact on Security, Risk and Governance in a Hybrid Cloud World
AI is a crucial ally in proactively identifying and addressing hybrid cloud threats, streamlining compliance processes and establishing robust governance frameworks ...
Security Boulevard
Achieving Zero Trust Network, Application, and Cloud Security with Linux
Nik Hewitt | | application protection, Best Practices, Cloud, lateral movement, Linux, microsegmentation, next gen security, security, Security Research, zero trust
How can organizations achieve zero trust best practices when using a Linux environment? As so many organizations increasingly adopt zero trust security models to protect their networks, applications, and cloud environments, Linux ...
Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back
Tom Eston | | airline, Airline Reservation, alarm, Alarm System, Cyber Security, Cybersecurity, Data Privacy, Data Tracking, Digital Privacy, Eaton, Episodes, facebook, Flight, Fraud, idor, Information Security, Infosec, insecure-direct-object-reference, Instagram, Meta, owasp, OWASP Top 10, Podcast, Podcasts, Privacy, scam, Scams, SecureConnect, security, Smart Alarm, technology, Threads, Twitter, vulnerability, Weekly Edition
In this episode, we explore the rise of Threads, a new social media app developed by Meta, which has already attracted 10 million users in just seven hours. However, there’s a catch ...
Unraveling NIS2 Compliance
Nik Hewitt | | advice, anlaysis, Best Practices, Cybersecurity, next gen security, security, Security Research, zero trust
An overview and guidelines for simple NIS2 compliance Safeguarding an organization from the bad actors out there is no small feat – and keeping up to date with the latest local and ...
Why Insider Risk Cybersecurity Should be a Major Concern
Nik Hewitt | | Best Practices, Cybersecurity, insider threat, lateral movement, malicious insiders, security, Security Research, zero trust
Why every organization should be concerned about insider risk cybersecurity and what we can do about it The importance of securing an organization against cyber threats has never been more critical. However, ...
Navigating Kubernetes and Cloud-Native Security
The era of cloud-native applications has arrived, and new security challenges have emerged for those developing cloud-native applications. Many modern business applications live in cloud native computing environments today because the cloud ...