Top Funnel​ - Tagged - Security Boulevard
Identity Management Day

It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground

Today is Identity Management Day – a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). In the midst of a dramatic technological and economic ...
Internet Privacy Prank

6 Simple Remote Work Security Mistakes and How to Avoid Them

Since the COVID-19 outbreak there have been countless headlines and viral social media posts exposing some of the worst remote security faux pas, ranging from the financially devastating to the easily avoidable ...
DevOps Cloud Native Application Security

Applications Are Everything and Everywhere – Does Whack-a-Mole Security Work?

The SolarWinds digital supply chain attack began by compromising the “heart” of the CI/CD pipeline and successfully changing application code. It highlighted the major challenges organizations face in securing their applications across ...
CISO View Survey and Report

New CISO View Insights on Zero Trust

Credential theft is on the rise, yet attackers are shifting their collective focus to non-traditional user populations that may not be adequately protected. That’s according to the “The CISO View 2021 Survey: ...
Identity Security Zero Trust Guidance

CISA and NSA: The Times, They Are A-Changin.’ Identity is Everything Now

The recent SolarWinds Senate hearing and a flurry of subsequent briefings have unearthed new questions around the attack, which acting director of the U.S. Cybersecurity and Infrastructure Agency (CISA) Brandon Wales called ...
Verkada IoT Security Breach

Different IoT Breach, Same (In)Security Story, Broader Consequences

“I always feel like somebody’s watching me… Tell me is it just a dream?” It may have been a dream in 1984 when “Somebody’s Watching Me” topped the charts, but today it’s ...
Access Management Is Evolving

Four Trends Shaping the Future of Access Management

From a remote employee using a personal device for work, to a marketing consultant logging into a shared social media account, to a customer authenticating to use a SaaS app, someone is ...
misconfigured cloud identities

Attacker Productivity: Exploit Misconfigured Identities in the Cloud

“My goal is no longer to get more done, but rather to have less to do,” writes author Francine Jay. It’s a sentiment that resonates with many of us juggling work, life ...
Rise of the BISO

Why the BISO May Be the Utility Player Your Org Needs Now

Back in 2012, Security Innovation wrote about what – at the time – was a relatively new C-Level role dubbed Chief Information Security Officer. In the introductory blog post, the author attempted ...
SolarWinds Senate Hearing Zero Trust

SolarWinds Senate Hearing: Moving Forward It’s All About Zero Trust

We still don’t have a complete picture of what exactly happened during the SolarWinds attack in 2020, nor do we know the full extent yet of the damage or what the long-term ...