Pushing the Limits of IDaaS with AMaaS

Concern over secure access to data has led to significant adoption of cloud identity management solutions, specifically identity-as-a-service (IDaaS), to ensure that people accessing applications are who they say they are–that is, to authenticate thei… Continue reading Pushing the Limits of IDaaS with AMaaS

CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable

Speed to market is the mantra of software development today. This does not mean that a process is not followed, it means that an iterative approach to software development produces code changes and usable code much faster.
The post CISO Stories P… Continue reading CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable

Security and Culture are Key to Digital Transformation

With digital business initiatives accelerating across nearly every industry, Gartner projects worldwide IT spending to reach a whopping $4.1 trillion by the end of the year. This data reflects something every forward-looking business leader already kn… Continue reading Security and Culture are Key to Digital Transformation

Kaseya Breach: Key Takeaways for Managed Service Providers

As a result of the recent Kaseya ransomware attack, and the mistakes leading up to their breach, all MSPs and MSSPs are likely to combat far-reaching consequences and implications. Now, your clients are beginning to scrutinize their relationships … Continue reading Kaseya Breach: Key Takeaways for Managed Service Providers

Ransomware and the C-I-A Triad

In earlier, more innocent (?) times, cyberattacks seemed to be fairly straightforward. You have the data exfiltration attacks, where copies of sensitive personal information and intellectual property are stolen, often without the victims’ knowledge sin… Continue reading Ransomware and the C-I-A Triad

CISO Interview Series: How Aiming for the Sky Can Help Keep Your Organization Secure

Organizations need the right internal personnel like a CISO to keep their systems and data secure. But what kind of skills do these leaders need? And how should they guide their employers in a way that doesn’t overlook the evolving threat landscape? To… Continue reading CISO Interview Series: How Aiming for the Sky Can Help Keep Your Organization Secure

Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

A new book exposes yet another Facebook failure for the social media firm to say sorry about. But nothing’s going to change.
The post Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data appeared first on Security Boulevard.
Continue reading Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

Ask Chloé: Returning to the Office

Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé discusses cybersecurity companies’ push to return worker… Continue reading Ask Chloé: Returning to the Office

How to Ensure Continuous Compliance with NERC CIP

What is NERC? The North American Electric Reliability Corporation, or NERC, is the largest electric reliability organization in North America. They’re responsible for over 1,900 bulk power system operations spanning the United States and Canada and the… Continue reading How to Ensure Continuous Compliance with NERC CIP