Reaction to Social Engineering Indicative of Cybersecurity Culture

During COVID-19, threat actors used fear of the virus and hope of a vaccine to trick unwitting victims into downloading malware or giving up their credentials. It was a master class in social engineering, one that put an organization’s security postur… Continue reading Reaction to Social Engineering Indicative of Cybersecurity Culture

One Medical: Sorry-not-Sorry for Leaking your Personal Info

Primary care med-tech firm One Medical sent email to countless customers, with hundreds of other customer email addresses visible in the To: field.
The post One Medical: Sorry-not-Sorry for Leaking your Personal Info appeared first on Security Bouleva… Continue reading One Medical: Sorry-not-Sorry for Leaking your Personal Info

Reducing the Risk of Credential Leakage

Long-term cloud credentials are often scattered throughout source code, on laptops or desktops, on servers, in cloud resources and in other locations. It’s easy to copy them across machines, creating credential sprawl that increases your leakage risk…. Continue reading Reducing the Risk of Credential Leakage

Can Managed Security Keep Businesses Safer?

In the last two decades, the cybersecurity industry has grown from a niche sector into a dominant force in the business world. Today, Gartner predicts that cybersecurity spending will reach $150 billion this year, almost double what was predicted in 2… Continue reading Can Managed Security Keep Businesses Safer?

REvil’s Linux Version Targets VMware ESXi Virtual Machines

Organizations running ESXi environments that thought they had somehow escaped the attention of REvil ransomware operators are in for a rude awakening – the ransomware-as-a-service’s repertoire now includes a Linux version aimed squarely at VMware ESXi… Continue reading REvil’s Linux Version Targets VMware ESXi Virtual Machines

Demystifying SSD Security

You left your laptop in a taxi or it was confiscated at a customs checkpoint. How do you ensure your personal or corporate data is safe? There are a number of best practices to follow. SSD Best Practices Step 1: Shut down your device in public spaces … Continue reading Demystifying SSD Security

A New Approach to Tackling Cybersecurity Threats

Last month, the FBI warned that ransomware attacks, like the one on the Colonial Pipeline, are a growing problem. From attacks on the Miami-Dade School District to Apple’s $50 million ransomware mess, the agency is investigating growing instances of c… Continue reading A New Approach to Tackling Cybersecurity Threats

XDR Demands a New Approach to Security—and Business

Everybody wants to rule the world, at least according to that Tears for Fears song a few decades back. This principle certainly holds true in the cybersecurity market. With extended detection and response (XDR) and the newer advancement of Open XDR be… Continue reading XDR Demands a New Approach to Security—and Business

Data Clean Rooms for Innovation and Collaboration

Data, being a key enabler for innovation, growth, development and revenue, is the currency of the 21st century and an organization’s most valuable asset. Unlike a tangible asset, the value an organization can seek from data is endless; essentially, th… Continue reading Data Clean Rooms for Innovation and Collaboration

Open Source Package Management: Balancing Power and Security

There is a wide ecosystem of open source software, and distributing it has always been a challenge. There is often a central location or index where a publisher or an individual can put their software for others to access it. Finding and consuming it,… Continue reading Open Source Package Management: Balancing Power and Security