How Self-Supervised AI Tackles Ambiguity in Network Security

Cybersecurity vendors promise the moon when it comes to AI. As the recent TechRepublic article, “Why cybersecurity tools fail when it comes to ambiguity,” makes clear, often, these promises fail short in real world network environments.
The post How Se… Continue reading How Self-Supervised AI Tackles Ambiguity in Network Security

The Future of Cyberwarfare

Over the years, we have seen an escalation in the series of hacks on health care services, power grids, nuclear plants and our privacy, with no respite. The threat is not just from China alone. It could be from North Korea or, as a matter of fact, fro… Continue reading The Future of Cyberwarfare

Huge Fallout from Microsoft Incompetence: Let’s Exchange Exchange

Countless organizations using Microsoft Exchange are scrambling to undo the damage caused by hackers. And it’s all Microsoft’s fault.
The post Huge Fallout from Microsoft Incompetence: Let’s Exchange Exchange appeared first on Security Boulevard.
Continue reading Huge Fallout from Microsoft Incompetence: Let’s Exchange Exchange

Chinese Exchange Hack: At Best, Microsoft is Incompetent

This week brought news of Chinese hackers attacking Microsoft Exchange. But why did Microsoft wait eight weeks to tell anyone?
The post Chinese Exchange Hack: At Best, Microsoft is Incompetent appeared first on Security Boulevard.
Continue reading Chinese Exchange Hack: At Best, Microsoft is Incompetent

How Threat Modeling Enabled Election Security

When Christopher Krebs was director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), his job was to make sure he understood the risk management landscape so the agency could fulfill its role as th… Continue reading How Threat Modeling Enabled Election Security

Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it

Gab has been hacked. The app fell “victim” to a simple SQL injection attack. But the CEO’s response was a trans-phobic slur.
The post Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it appeared first on Security Boulevard.
Continue reading Unknown Hacker Grabs Gab’s Data, DDoSecrets Doesn’t Leak it

XDR versus Evolved SIEM ? What?s the Difference?

XDR and evolved SIEM solutions offer similar capabilities and benefits. To choose between evolved SIEM and XDR, organizations should first ask what they?re looking to achieve and consider the value of both before deciding.
The post XDR versus Evolved S… Continue reading XDR versus Evolved SIEM ? What?s the Difference?

Twitter Removes Russian Disinformation Accounts

On Feb. 23, 2021 Twitter booted a gaggle of accounts from its platform, including those determined to be associated with the Russian government and the well-known disinformation machine Internet Research Agency (IRA). Twitter regularly culls users; th… Continue reading Twitter Removes Russian Disinformation Accounts

‘Dangerous’ RCE in VMware: Patch, or the Puppy Gets It

A really nasty remote code execution vulnerability is being exploited right now. VMware vCenter can be trivially broken into.
The post ‘Dangerous’ RCE in VMware: Patch, or the Puppy Gets It appeared first on Security Boulevard.
Continue reading ‘Dangerous’ RCE in VMware: Patch, or the Puppy Gets It

XDR: Next-Level Prevention and Detection

Security professionals are inundated with thousands of alerts per day generated by a growing number of cybersecurity tools. Investigating and connecting individual alerts to events often takes days. Seeing the proverbial forest for the trees is an ong… Continue reading XDR: Next-Level Prevention and Detection