Changes Included in the Stable Release 24.02 of Azul Zing Builds of OpenJDK

| | Java, security
Azul Platform Prime is a Java platform with a modern, TCK-compliant JVM, Azul Zing, based on OpenJDK. Zing provides low, consistent response latency of your Java workloads, higher total throughput and carrying ...
Look Good & Gain Peace of Mind with Fairwinds' Managed Kubernetes

Look Good & Gain Peace of Mind with Fairwinds’ Managed Kubernetes

| | security
Identifying and remediating Common Vulnerabilities and Exposures (CVEs) as soon as possible is important for businesses, particularly when a new vulnerability is disclosed. In organizations using microservices, containers, and Kubernetes, such vulnerabilities ...

CVE-2024-21412 Vulnerability Reported in Defender SmartScreen

Guarding against SmartScreen bypass (CVE-2024-21412) and DarkGate malware campaign A recent surge in cyberattacks has seen malevolent actors exploiting a vulnerability in Windows Defender SmartScreen, a critical security feature designed to protect ...
Apple research study, data breaches, immutable storage, backup storage, ransomware data backup

Building a Security Culture of Shared Responsibility

These seven major factors can contribute to (or hinder) the development of a positive cybersecurity culture ...
Security Boulevard

New Phishing Campaign Delivers Remote Access Trojans (RATs)

Sophisticated phishing campaign leverages public services, where remote access Trojans are being delivered via malicious Java downloader A new phishing campaign has surfaced this week which cleverly employs a Java-based downloader to ...
GenAI, threats, ChatGPT Gemini generative AI

ChatGPT and Beyond: Generative AI in Security

The application of generative AI in security is a game-changer, offering novel solutions to pressing challenges in cybersecurity ...
Security Boulevard
What is FIPS

FAQ: What is FIPS 140-2 and “Validated Cryptography”?

| | security
As time marches on and technology develops, there’s a constant push and pull between information security and attempts to breach that security. Obscurity – simply hiding from sight – isn’t enough with ...
SEC rules, cybersecurity, SEC cyber data breach rules

Five Unintended Consequences of the New SEC Cybersecurity Disclosure Rule

The SEC's recent regulatory compliance mandate regarding breach disclosures is having some unintended consequences ...
Security Boulevard

What is GRC, and Why is it Important for Cybersecurity?

Within cybersecurity, what is GRC, and why is it so important?  GRC is a benchmark for structured strategy, encompassing governance, risk, and compliance. These are important CISO responsibilities and as critical for ...