AI, cyber GRC, Microsoft AI cybersecurity

KubeCon 2023: Securing Software Delivery and Deployment

At KubeCon 2023, Mitch Ashley talks with Gopal Dommety and David Green from OpsMX about securing software delivery and deployment ...
Security Boulevard

Critical Veeam ONE Vulnerabilities Addressed

Veeam has recently released essential updates to address four security vulnerabilities in its Veeam ONE monitoring and analytics platform. Two of them are critical, and it is crucial to apply these fixes ...

Progress Hotfixes: Rapid Action Against Vulnerabilities

Progress Software has acted quickly to strengthen the security of its software offerings by issuing a number of hotfixes. These Progress hotfixes are intended to address a severe security hole as well ...

Nagios XI Network Monitoring Software Flaws Exposed

A number of Nagios XI network monitoring software flaws have recently been discovered. These flaws have the potential to result in privilege escalation and data disclosure. Nagios XI is a popular monitoring ...
The IoT Impact On Automotive Security And How To Solve The Challenge With Ravishankar Chamarajnagar, CPO At AppViewX

The IoT Impact On Automotive Security And How To Solve The Challenge With Ravishankar Chamarajnagar, CPO At AppViewX

Welcome to our insightful blog featuring an in-depth conversation with Ravishankar (Ravi) Chamarajnagar, Chief Product Officer (CPO) of AppViewX, as we delve into the realm of the Internet of Things (IoT). Our ...
ransomware

How to Strengthen Cybersecurity in the Age of AI

To get ahead of the adversaries in this new AI age, cybersecurity research into new generative AI attacks and defenses must be further along ...
Security Boulevard
Checkmarx sonrai burnout vacation beach remote work

Checkmarx Details Potential Threats to AWS S3 Buckets

Checkmarx disclosed how cybercriminals can hijack S3 storage bucket binaries on the AWS cloud by replacing binaries with malicious ones ...
Security Boulevard

Enhance Your Cybersecurity With An SBOM

With all the cybersecurity benefits an SBOM offers, it’s a wonder they weren’t used in the software development life cycle long ago. Today, the need for SBOMs has grown more urgent because ...
Google Kubernetes vulnerabilities

SBOMs’ Role in Open Source Security

When the Cybersecurity and Infrastructure Security Agency (CISA) announced its guidelines to promote better security of the software supply chain, the agency touted the software bill of materials (SBOM) as “a key ...
Security Boulevard
vulnerability curl patch

Lazarus Assault Via 3CX Exposes Need to Rethink Security

When North Korean threat actors the Lazarus Group exploited a legitimate update to the 3CXDesktopApp—a softphone application from 3CX—security professionals didn’t initially pick up on the import of the activity and tactics ...
Security Boulevard