Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary Coast of northern Africa. The Barbary States had been the scourge of the seas for centuries. They raided coastal … Continue reading Barbary Pirates and Russian Cybercrime

Where Did REvil Ransomware Go? Will it Be Back?

Speculation swirled over why the prolific and dangerous REvil ransomware went offline – blog, payment processing, all suddenly went kaput – it’s important not to lose sight of the bigger issues. While the ransomware is gone, at least for the time bein… Continue reading Where Did REvil Ransomware Go? Will it Be Back?

Salt Security Report Highlights Prevalence of API Vulnerabilities

Salt Security, a provider of a platform for securing application programming interfaces (APIs), today published a report that reveals the existence of vulnerabilities in APIs in an unidentified platform employed widely in the financial services indust… Continue reading Salt Security Report Highlights Prevalence of API Vulnerabilities

Spot the Ball & Security Detection Games

When I was younger, and printed newspapers were a more common household purchase, I remember fondly watching my mother play a game called “Spot the Ball.” For those of you not familiar with this, it consisted of a photograph of a recent football (socce… Continue reading Spot the Ball & Security Detection Games

Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch

Amazon’s Ring unit is moving ahead with plans to allow end-to-end encryption (E2EE).
The post Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch appeared first on Security Boulevard.
Continue reading Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch

Zero-Trust for the Post-Pandemic World

More than a year after the start of the COVID-19 pandemic, we’re seeing most companies either maintaining their remote work policies or slowly moving to a hybrid work model. In fact, an estimated 36.2 million Americans will be working remotely by 2025… Continue reading Zero-Trust for the Post-Pandemic World

Security in the Age of Increasing Cyberattacks

In June 2021, I was discussing with a colleague why, despite all the discourse about security, we continue to read about cybersecurity attacks. On that same day, the Belgian city of Liege announced that it had been the victim of a ransomware attack. D… Continue reading Security in the Age of Increasing Cyberattacks

Ensuring HIPAA compliance when using the cloud

Accelerated by the pandemic, health IT has continued to innovate at pace, while having to balance data protection and regulatory rules. However, critical transformations – like transitioning to the cloud – are a tougher challenge for this industry than… Continue reading Ensuring HIPAA compliance when using the cloud

Spoofed Domains Still a Persistent Threat

Domains impersonating companies and their brand names still pose a significant threat—research from Digital Shadows released today found that on average 1,100 fake websites are registered against individual organizations annually. And with commercial … Continue reading Spoofed Domains Still a Persistent Threat

Balancing Agility with Data Security

Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and … Continue reading Balancing Agility with Data Security