Judge Orders Capitol Rioter to Unlock Laptop

Guy Reffitt traveled from his home in Wylie, Texas, to Washington, D.C., with an AR-15 rifle and a Smith & Wesson .40 caliber handgun, to participate in the riot and obstruction of Congress that occurred at the U.S. Capitol on January 6, 2021. He … Continue reading Judge Orders Capitol Rioter to Unlock Laptop

US Offers Bounty for Tips on State-Sponsored Cybercrime

Last week, the Biden administration announced a ‘new’ Rewards for Justice program offering up to $10 million USD for information relating to those who create and perpetuate ransomware attacks against U.S. infrastructure. The program, admin… Continue reading US Offers Bounty for Tips on State-Sponsored Cybercrime

Securing UX in Open Banking Apps

Historically, only large, well-established banks had control over the majority of consumer and corporate finances, making it highly challenging for smaller financial services providers to break into the market. Open banking has transformed the way org… Continue reading Securing UX in Open Banking Apps

Security and Culture are Key to Digital Transformation

With digital business initiatives accelerating across nearly every industry, Gartner projects worldwide IT spending to reach a whopping $4.1 trillion by the end of the year. This data reflects something every forward-looking business leader already kn… Continue reading Security and Culture are Key to Digital Transformation

Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

Yet another zero-day bug in iOS has allowed notorious spyware vendor NSO Group to break into the iPhones of journalists and activists.
The post Apple’s Insecure iPhone Lets NSO Hack Journalists (Again) appeared first on Security Boulevard.
Continue reading Apple’s Insecure iPhone Lets NSO Hack Journalists (Again)

WHAT IS A SIEM, AND WHY SHOULD YOU HAVE ONE?

SIEM (pronounced like “sim” from “simulation”), which stands for Security Information and Event Management, was conceived of as primarily a log aggregation device. However, a SIEM’s primary capabilities are to provide threat detection, better enable in… Continue reading WHAT IS A SIEM, AND WHY SHOULD YOU HAVE ONE?

Kaseya Breach: Key Takeaways for Managed Service Providers

As a result of the recent Kaseya ransomware attack, and the mistakes leading up to their breach, all MSPs and MSSPs are likely to combat far-reaching consequences and implications. Now, your clients are beginning to scrutinize their relationships … Continue reading Kaseya Breach: Key Takeaways for Managed Service Providers

Top 5 NCSC Cloud Security Principles for Compliance

There are many important factors to consider when choosing a cloud provider for your cloud use cases. For organizations in heavily regulated industries, compliance with relevant regulations is one of the most important things to think about. Whether yo… Continue reading Top 5 NCSC Cloud Security Principles for Compliance

Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

A new book exposes yet another Facebook failure for the social media firm to say sorry about. But nothing’s going to change.
The post Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data appeared first on Security Boulevard.
Continue reading Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data

Ask Chloé: Returning to the Office

Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé discusses cybersecurity companies’ push to return worker… Continue reading Ask Chloé: Returning to the Office