Security Boulevard at RSAC Singapore 2019

Security Boulevard is in attendance at RSA Conference Singapore 2019, covering sessions and hosting interviews through our sister site, Digital Anarchist. Keep watching for videos of conversations with the security industry’s finest, which will … Continue reading Security Boulevard at RSAC Singapore 2019

Red Forest, or Well-Managed Active Directory

Data breaches and other security incidents over the last few years have caused vulnerabilities such as “Pass the Hash” to resurface. It has been said before but bears repeating that perimeter security alone is no longer sufficient to secur… Continue reading Red Forest, or Well-Managed Active Directory

5 Mobile Security Threats to Recognize

Mobile security has become a top concern for a number of companies, as the average cost of a corporate data breach is $3.86 million. Employees often access and use corporate data through their smartphones, which means protecting sensitive data can be … Continue reading 5 Mobile Security Threats to Recognize

DevOps Chat: Email Security with Barracuda Networks’ Asaf Cidon

Asaf Cidon is the VP of Email Security at Barracuda Networks. In this DevOps Chat, we sat down with Asaf and spoke about some of the new threats and up-and-coming attack vectors in email security. Asaf is in a unique position at Barracuda to be on the… Continue reading DevOps Chat: Email Security with Barracuda Networks’ Asaf Cidon

RSA Conference 2019 Videos: Day 1

The RSA Conference is an interesting mix of security pundits, vendors, analysts and reporters, all in attendance (ostensibly) for the same reason: to better understand the current state of cybersecurity and discern what the future holds. This year&#82… Continue reading RSA Conference 2019 Videos: Day 1

Why We Should Focus on ‘How,’ not ‘Who,’ of Cyberattacks

Organizations often don’t understand what they need to be protecting themselves from when it comes to costly cyberattacks. The threat landscape is becoming ever more evolved and it’s now rare for a day to go by without a new form of cyberattack hittin… Continue reading Why We Should Focus on ‘How,’ not ‘Who,’ of Cyberattacks

Remedy for a ‘Dying’ Software Development Team

I know the title might sound a bit melodramatic, but in my experience, software teams that are living on the drip-feed of careless (read: insecure) coding and the arrogance of ignoring secure practices for testing and deployment are staring at near de… Continue reading Remedy for a ‘Dying’ Software Development Team

Security Awareness: 5 Creative Ways to Train Employees on Cybersecurity

Security awareness in the workplace takes effective training Fifteen years ago, the No. 1 problem plaguing corporate email inboxes was spam, which bogged down users but wasn’t typically malicious. A lot has changed since then: Today, hackers and cyber… Continue reading Security Awareness: 5 Creative Ways to Train Employees on Cybersecurity

Why the Point Solution Mindset for IT Security is Dead

For decades, we’ve operated in a “point solution” mindset when it comes to IT security. In other words, we’ve used distinct tools to address distinct security needs. That approach to security worked well for decades. But the world has moved on. We no … Continue reading Why the Point Solution Mindset for IT Security is Dead