Supply Chain Security – Not As Easy As it Looks

The massive exploit of SolarWinds is a prime example of what is called a “supply chain” vulnerability. The vast majority of those impacted by the Russian SolarWinds attack probably had never even heard of the company SolarWinds, and did not realize th… Continue reading Supply Chain Security – Not As Easy As it Looks

Demystifying cybersecurity with a more human-centric approach

Every business, whether small or large, needs to address cybersecurity to operate in today’s online world. This has been a stimulus for the cybersecurity industry and explains the market’s expected 10.9% growth from 2021 to 2028. As the industry has ma… Continue reading Demystifying cybersecurity with a more human-centric approach

Spyware: What It Is, How It Works, and How to Prevent It

You might feel safe while using your phone or laptop packed with all the latest security features. However, it might not be entirely true sometimes. There may be something in your machine that tracks you all the time without you knowing. That culprit c… Continue reading Spyware: What It Is, How It Works, and How to Prevent It

SHOCKER: Senate Says Security Sucks—Still

A Senate committee graded cybersecurity as poor among eight big agency departments. Not much has changed since the last report.
The post SHOCKER: Senate Says Security Sucks—Still appeared first on Security Boulevard.
Continue reading SHOCKER: Senate Says Security Sucks—Still

Report Finds Software Supply Chains Rife with Vulnerabilities

A report published today by application security testing tool provider GrammaTech in collaboration with Osterman Research suggests just about every software supply chain is rife with vulnerabilities. An analysis of commercial off-the-shelf (COTS) appl… Continue reading Report Finds Software Supply Chains Rife with Vulnerabilities

Black Hat insights: WAFs are getting much more dynamic making them well-suited to protect SMBs

A cornucopia of cybersecurity solutions went on public display today as Black Hat USA 2021 convened once more as a live event in Las Vegas.
Related: Kaseya hack raises more supply chain worries
For small- and mid-sized businesses (SMBs) cutting … (more… Continue reading Black Hat insights: WAFs are getting much more dynamic making them well-suited to protect SMBs

When it Comes to SASE, Trust but Verify

The last 18 months raised important questions about what work looks like, where it happens and which applications count as truly “business-critical.” In some ways, though, the worldwide scramble to rethink enterprise IT was long overdue. The fact is, … Continue reading When it Comes to SASE, Trust but Verify

When it Comes to SASE, Trust but Verify

The last 18 months raised important questions about what work looks like, where it happens and which applications count as truly “business-critical.” In some ways, though, the worldwide scramble to rethink enterprise IT was long overdue. The fact is, … Continue reading When it Comes to SASE, Trust but Verify

Is Your VPN Tracking (and Leaking) User Activity?

The VPN industry touts all sorts of privacy protocols and encryption methods that purport to protect users. While this is, undoubtedly, important information, and is a decent way to compare and contrast different VPN services, it isn’t the full story … Continue reading Is Your VPN Tracking (and Leaking) User Activity?

Developing Best Practices for API Security

APIs are pivotal to the overall success of a digital transformation. They allow developers to work across the digital assets and across multiple systems with ease. More organizations are adopting API initiatives, and are approaching digital transforma… Continue reading Developing Best Practices for API Security