Is Biden’s Peloton Bike an IoT Cybersecurity Risk?

President Biden may be bringing an IoT cybersecurity risk to the White House: his Peloton bike. Here’s how to handle similar threats.
The post Is Biden’s Peloton Bike an IoT Cybersecurity Risk? appeared first on Security Boulevard.
Continue reading Is Biden’s Peloton Bike an IoT Cybersecurity Risk?

BullPhish ID is Fully Revamped and Raring to Go

The NEW improved BullPhish ID is packed with updates & upgrades that make phishing resistance training a snap for everyone!
The post BullPhish ID is Fully Revamped and Raring to Go appeared first on Security Boulevard.
Continue reading BullPhish ID is Fully Revamped and Raring to Go

Help translating technical risk to business risk for a non-technical manager

I’m supporting a manger of multiple development teams. This manager has little technical comprehension. This manager is also an approval authority for risk exceptions. The manager or her directs frequently call me and asks what is this … Continue reading Help translating technical risk to business risk for a non-technical manager

Application Layer Gateway (ALG) is it enough to secure a small office? [closed]

I’ve been reading about ALG. I have a small size network with 11 users mostly using accounting applications. I’m wondering:

Is applying ALG (to provide web filtering, anti-virus function, etc.) enough to protect my network?
How much NAT i… Continue reading Application Layer Gateway (ALG) is it enough to secure a small office? [closed]

Tips for Applying the Known in a Time of Uncertainty

While the future is unclear, turn to the certainties to help your business navigate today’s disruption.
The post Tips for Applying the Known in a Time of Uncertainty appeared first on Security Boulevard.
Continue reading Tips for Applying the Known in a Time of Uncertainty

Amid Disruption, Identity Access Takes Center Stage

With today?s business disruption, the workforce is more dynamic than ever. That?s why organizations should bet on their identity assurance strategy to help mitigate risk.
The post Amid Disruption, Identity Access Takes Center Stage appeared first on Se… Continue reading Amid Disruption, Identity Access Takes Center Stage

It Takes Two to Tango

Cooperation between fraud and risk departments and information security departments is essential. After all, these are two sides of the same coin: the failure to address cyber risk invariably leads to fraud.
The post It Takes Two to Tango appeared firs… Continue reading It Takes Two to Tango

Why You Need a Chief Trust Officer

To address the challenge of digital risk, organizations need to look at creating the role of a Chief Trust Officer to help them navigate the risks of digital transformation.
The post Why You Need a Chief Trust Officer appeared first on Security Bouleva… Continue reading Why You Need a Chief Trust Officer