Defining XDR from an MSSP Perspective

If you’re not entirely clear on what Extended Detection and Response (XDR) is, you wouldn’t be alone. Most understand it as the evolution of Endpoint Detection and Response (EDR) that covers the areas of the attack surface beyond the endpoint, inc… Continue reading Defining XDR from an MSSP Perspective

Will Full Autonomy Ever Be Realized?

Matt Novak of Gizmodo posted an article on April 30, 2021 with the title “Elon Musk Shares Painfully Obvious Idea About the Difficulty of Self-Driving Cars,” available at Elon Musk Shares Painfully Obvious Idea About the Difficulty of Self-Driving Cars… Continue reading Will Full Autonomy Ever Be Realized?

Very Many Qualcomm Phone Chips Hiding Very Nasty Vulnerability

A high-severity bug affects almost 40% of Android phones. The security hole is in Qualcomm modems.
The post Very Many Qualcomm Phone Chips Hiding Very Nasty Vulnerability appeared first on Security Boulevard.
Continue reading Very Many Qualcomm Phone Chips Hiding Very Nasty Vulnerability

Enterprises Misplace Trust in Partners, Suppliers

In an era when many organizations are focused on building zero-trust access control architectures, many are paradoxically extending considerable trust to the third parties they enable to access their systems remotely. And that trust is placing them at… Continue reading Enterprises Misplace Trust in Partners, Suppliers

Third-wave AI has Proven More Effective than Traditional Cybersecurity Platforms and Methodologies

Unfortunately, the majority of cybersecurity solutions available today rely on outdated applications for AI. So-called first- and second-wave AI solutions don’t cut it, but few vendors have the technical capabilities and know-how to apply cutting edge,… Continue reading Third-wave AI has Proven More Effective than Traditional Cybersecurity Platforms and Methodologies

Benefits of Building a Multi-prong Mousetrap for WAF Policies with ML

The reason behind buying a market-leading Web Application Firewall (WAF) is to protect your website and web applications from malicious attacks, plus complying with industry or regional data and privacy standards. In addition to the typical OWASP Top 1… Continue reading Benefits of Building a Multi-prong Mousetrap for WAF Policies with ML

Five worthy reads: Is DataOps the next big value driver in the analytics ecosystem?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about DataOps, an interesting methodology that can help organizations fast-track their data ana… Continue reading Five worthy reads: Is DataOps the next big value driver in the analytics ecosystem?

Cybersecurity Spend for Data Retention and Analysis is Out of Control and Largely Unnecessary

Managing a relatively small, stable data store is one thing, but dynamic companies face immense challenges when those circumstances change. Data growth can become unwieldy to safeguard when it has to be carefully prepared through a series of time-consu… Continue reading Cybersecurity Spend for Data Retention and Analysis is Out of Control and Largely Unnecessary

U.S. DoD has World’s Largest Honeypot: 6% of Internet Space

175 million IP addresses owned by the U.S. Defense Department have “appeared” on the public internet.
The post U.S. DoD has World’s Largest Honeypot: 6% of Internet Space appeared first on Security Boulevard.
Continue reading U.S. DoD has World’s Largest Honeypot: 6% of Internet Space