4 Ways to Improve Governance in Product Security

Security is all about closing gaps—between attacker tactics and your defensive capabilities, for instance, or the known and unknown user identities in your cloud infrastructure. An important gap that too many organizations overlook actually starts at … Continue reading 4 Ways to Improve Governance in Product Security

Remote Workforce Monitoring Brings Up Privacy Concerns

The pandemic paved the way for expanded remote work possibilities, but companies looking to ensure employees remain on the job while at home have led some to consider technologies to digitally monitor worker activity, in some cases through AI. Those i… Continue reading Remote Workforce Monitoring Brings Up Privacy Concerns

Kaseya Starts Recovery After REvil Attack

Kaseya is now reporting the software-as-a-service (SaaS) instance of its Virtual System Administrator (VSA) platform will be back online sometime between 4:00 p.m. and 7:00 p.m. EST today. It expects the on-premises editions of VSA to be patched withi… Continue reading Kaseya Starts Recovery After REvil Attack

REvil Makes Monkeys out of Kaseya Customers

Over the long weekend, a huge ransomware attack emerged. Kaseya seems to have been the common component.
The post REvil Makes Monkeys out of Kaseya Customers appeared first on Security Boulevard.
Continue reading REvil Makes Monkeys out of Kaseya Customers

Zero-Trust at the Data Layer

Often, ideas are ahead of their time. In October 2017, IDC’s Simon Piff and Hugh Ujhazy published a paper positing that data was the new endpoint. There is good chance that, in the near future, they will stand on the same zero-trust pedestal as Forres… Continue reading Zero-Trust at the Data Layer

Reaction to Social Engineering Indicative of Cybersecurity Culture

During COVID-19, threat actors used fear of the virus and hope of a vaccine to trick unwitting victims into downloading malware or giving up their credentials. It was a master class in social engineering, one that put an organization’s security postur… Continue reading Reaction to Social Engineering Indicative of Cybersecurity Culture

Kaseya Details REvil Attack, Incident Response Plan

Kaseya, an IT service management (ITSM) tools provider employed by managed service providers (MSPs) and internal IT teams, announced it will keep the software-as-a-service (SaaS) edition of its platform offline until further notice after a ransomware … Continue reading Kaseya Details REvil Attack, Incident Response Plan

Barracuda Networks Acquires SKOUT Cybersecurity

Barracuda Networks this week extended the scope of its cybersecurity portfolio by agreeing to acquire SKOUT Cybersecurity. SKOUT’s security operations center (SOC) service and extended detection and response (XDR) software is primarily made avai… Continue reading Barracuda Networks Acquires SKOUT Cybersecurity

One Medical: Sorry-not-Sorry for Leaking your Personal Info

Primary care med-tech firm One Medical sent email to countless customers, with hundreds of other customer email addresses visible in the To: field.
The post One Medical: Sorry-not-Sorry for Leaking your Personal Info appeared first on Security Bouleva… Continue reading One Medical: Sorry-not-Sorry for Leaking your Personal Info

Reducing the Risk of Credential Leakage

Long-term cloud credentials are often scattered throughout source code, on laptops or desktops, on servers, in cloud resources and in other locations. It’s easy to copy them across machines, creating credential sprawl that increases your leakage risk…. Continue reading Reducing the Risk of Credential Leakage