Sunday, December 6, 2020
  • Phishing Attacks on Your Brand are Unrelenting, AI is the Only Way to Fight Back
  • Germany’s Anti-Semitic Phonetic Alphabet
  • DEF CON 28 Safe Mode Aerospace Village – Allan Tart’s & Fabian Landis’ ‘Low Cost VHF Receiver’
  • XKCD ‘Contiguous 41 States’
  • DEF CON 28 Safe Mode Aerospace Village – Matt Gaffney’s ‘MITM: The Mystery In The Middle’

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

Working from Home

managing privileged accounts

It’s Time to Get Serious About Managing Privileged Accounts

Didier Lesteven | September 30, 2020 | identity, PAM, Privileged Account Management, Working from Home
Managing privileged account access isn’t going to get easier, so the right strategy is more important than ever With people working from home in greater numbers, security professionals are rightly concerned about ...
Security Boulevard

How IT-OT Security Has Changed in the Wake of COVID-19

Kristen Poulos | August 23, 2020 | Digital Transformation, Featured Articles, information-technology, IT Security and Data Protection, operational technology, remote working, Working from Home
After the global outbreak of coronavirus 2019 (COVID-19), organizations quickly transitioned to remote work in order to enforce social distancing and to keep their employees safe. But this work-from-home arrangement opened up ...
The State of Security
webinar

Insights from Verizon’s COVID-19 Breach Landscape Report: Working From Home (WFH) leads to greater vulnerability

PCI Pal | August 18, 2020 | Data Breach Investigations Report, News & Opinion, remote working, verizon, WFH, Working from Home
Verizon’s report highlights four specific cyber challenges that have emerged this year as a result of the pandemic: the continued increase in human error, the focus on stolen credential-related hacking, the spike ...
Knowledge Centre – PCI Pal

Using Good Cyber Practices to Frame your Personal Cyber Narrative

Tripwire Guest Authors | July 27, 2020 | access management, cyber hygiene, Featured Articles, IT Security and Data Protection, Security Training, Working from Home
Someone in my Twitter timeline wrote a post that resonated with me. Instead of advocating the idea of our firms mandating what we can and cannot do in our homes as working ...
The State of Security

Fast User Access to SaaS for Users on Home Wi-Fi

Mehul Patel | July 9, 2020 | anti-phishing, CASB, cloud-delivered security, Digital Workforce, Phishing, Ransomware, remote work, Secure Remote Worker, SWG, Working from Home
Secure Remote Worker Use Case 1: Ensure Fast, Secure Access to SaaS Platforms Even before Covid-19 forced the adoption of work-from-home policies across the globe, the workforce had been getting more remote, ...
Menlo Security Blog

Equation Editor—Attackers continue to exploit CVE-2017-1182….

Vinay Pidathala | June 30, 2020 | anti-phishing, CASB, cloud-delivered security, Digital Workforce, Phishing, Ransomware, remote work, Secure Remote Worker, SWG, Working from Home
Menlo labs has observed limited attacks, where attackers are continuing to exploit CVE-2017-11882, an old Microsoft exploit with a patch that was issued more than two years ago. As a matter of ...
Menlo Security Blog

Business Continuity Requires Infrastructure Continuity in Times of Remote Working

Neil Harvey | May 27, 2020 | asset management, Featured Articles, IT Security and Data Protection, remote working, Working from Home
Over the last few weeks, most organisations have had to transition to enable their employees to work remotely. The key focus has been on business continuity during this trying time. Unfortunately, business ...
The State of Security
Netsurion

Security: COVID-19 Is Changing How America Works

Scott Gordon | May 15, 2020 | COVID-19, Cybersecurity, remote workers, security stance, Security Tools, WFH, Working from Home
The COVID-19 pandemic doesn’t have to mean security takes a back seat for remote workers. Here are a few tips With COVID-19 forcing millions into a new normal that requires working from ...
Security Boulevard

SaaS Adoption Eliminates Visibility Into and Control Over Users’ Web Browsing Behavior

Mehul Patel | April 9, 2020 | Cloud Adoption, Mobility, remote, Secure Remote Worker, Working from Home
We’ve been talking a lot recently about how changing work habits will disrupt enterprise security in 2020. Workers are becoming increasingly mobile, and enterprises continue to move mission-critical systems to the cloud ...
Menlo Security Blog
WFH SOC

Should a WFH SOC Be a New Reality?

Chris Triolo | April 8, 2020 | Business Continuity, remote SOC challenges, remote workers, Security Operations Center, SOC, Working from Home
In my last article, I laid out a path for how organizations could quickly get up to speed in deploying a work-from-home (WFH) security operations center (SOC) amidst the current pandemic. Since ...
Security Boulevard
Load more Loading...

TechStrong TV – Live

Watch latest episodes and shows
Featured Blog

Eric Kedrosky

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Michael Clark

Prevent Catastrophic Data Loss in the Cloud

Rich Gardner

CISO Roundtable: What We’ve Heard, and What We’re Looking Forward To

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Brazil Govt’s Huge Leak: Health Data of 243M
Securing the Office of the Future
California Federal Court Weighs In (Again) on Social Media Scraping
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
U.S. Election Security (and Insecurities)
Drupal Core: Behind the Vulnerability
VMware Horizon Architecture: Planning Your Deployment
There’s a RAT in my code: new npm malware with Bladabindi trojan spotted
A Modern Exploration of Windows Memory Corruption Exploits – Part I: Stack Overflows
“Free” Symchanger Malware Tricks Users Into Installing Backdoor

Upcoming Webinars

Mon 07

The Battle for Container Security

December 7 @ 1:00 pm - 2:00 pm
Tue 08

XDR (Extended Detection and Response): The Next Generation of Protection

December 8 @ 11:00 am - 12:00 pm
Thu 10

Data Security for Contact Centers Leveraging Cloud Technologies

December 10 @ 3:00 pm - 4:00 pm
Mon 14

Issues and Answers in Cloud Security

December 14 @ 1:00 pm - 2:00 pm
Tue 15

3 Things to Get Right for Successful DevSecOps

December 15 @ 3:00 pm - 4:00 pm
Wed 16

Unsolved Problems in Open Source Security

December 16 @ 11:00 am - 12:00 pm
Wed 16

Securing Medical Apps in the Age of COVID-19: How to Close Security Gaps and Meet Accelerated Demand

December 16 @ 1:00 pm - 2:00 pm
Wed 16

Deliver your App Anywhere … Publicly or Privately

December 16 @ 3:00 pm - 4:00 pm
Thu 17

Secure Your Peace of Mind and Your Mobile App While Giving Developers Back Their Happy Coding Time

December 17 @ 11:00 am - 12:00 pm
Thu 17

Solving Kubernetes Security Challenges Using Red Hat OpenShift and Sysdig

December 17 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

7 Must-Read eBooks for Security Professionals

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Why Hackers Love the Pandemic
Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

Why Hackers Love the Pandemic

December 4, 2020 Chris Hallenback | 2 days ago 0
Security and COVID-19: Securing the New Normal
Cybersecurity Data Security Industry Spotlight Network Security Security Boulevard (Original) 

Security and COVID-19: Securing the New Normal

December 3, 2020 DAVID CANELLOS | 3 days ago 0
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
Cybersecurity Industry Spotlight Security Boulevard (Original) Threats & Breaches 

Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy

December 2, 2020 Ameet Naik | 4 days ago 0

Top Stories

Brazil Govt’s Huge Leak: Health Data of 243M
Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured News Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

Brazil Govt’s Huge Leak: Health Data of 243M

December 4, 2020 Richi Jennings | 1 day ago 0
Second Swiss Firm Said to Be CIA Encryption Puppet
Analytics & Intelligence Cyberlaw Cybersecurity Featured News Security Boulevard (Original) Spotlight Threat Intelligence 

Second Swiss Firm Said to Be CIA Encryption Puppet

November 30, 2020 Richi Jennings | Nov 30 0
Unisys Adds Visualization Tools to Stealth Platform
Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight 

Unisys Adds Visualization Tools to Stealth Platform

November 30, 2020 Michael Vizard | Nov 30 0

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2020 MediaOps Inc. All rights reserved.

Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.