A New Approach to Tackling Cybersecurity Threats

Last month, the FBI warned that ransomware attacks, like the one on the Colonial Pipeline, are a growing problem. From attacks on the Miami-Dade School District to Apple’s $50 million ransomware mess, the agency is investigating growing instances of c… Continue reading A New Approach to Tackling Cybersecurity Threats

Data Breaches Rise as Organizations Shift to the Cloud

As more and more organizations make the move into public clouds, a corresponding rise in cloud data breaches has followed, according to an IDC survey of 200 security decision-makers in the U.S. The survey found nearly all (98%) of the companies survey… Continue reading Data Breaches Rise as Organizations Shift to the Cloud

SafeDollar Stablecoin not Safe nor Stable: Hack Sends Value to ZERO

SafeDollar, a crypto token that’s pegged to the U.S. dollar, crashed this week. The team claim it had been hacked.
The post SafeDollar Stablecoin not Safe nor Stable: Hack Sends Value to ZERO appeared first on Security Boulevard.
Continue reading SafeDollar Stablecoin not Safe nor Stable: Hack Sends Value to ZERO

Understanding Global IoT Security Regulations

The IoT is maturing rapidly, and surveys show that global IoT spending will achieve a combined annual growth rate (CAGR) of 11.3% over the 2020-2024 forecast period. It offers promising benefits that are rapidly transforming a variety of industries, i… Continue reading Understanding Global IoT Security Regulations

4 Warning Signs of an Insecure App

The “golden age of digital transformation” is upon us, and companies around the globe are scurrying to meet consumers on the digital frontier. For developers, it is a virtual gold rush, as businesses overhaul their infrastructure to meet consumers whe… Continue reading 4 Warning Signs of an Insecure App

How Offensive AI Can Disarm Cybersecurity

As more organizations adopt AI and ML as cybersecurity controls and to detect and deter attacks, cybercriminals are devising ways to use AI as the basis of attacks. “What’s known as ‘offensive AI’ will enable cybercriminals to direct targeted attacks … Continue reading How Offensive AI Can Disarm Cybersecurity

Did your WD My Book NAS get Wiped? Put a Brave Face on It

A 2019 vulnerability is being exploited to remotely wipe WD My Book Live NAS devices, by Eastern-European malefactors.
The post Did your WD My Book NAS get Wiped? Put a Brave Face on It appeared first on Security Boulevard.
Continue reading Did your WD My Book NAS get Wiped? Put a Brave Face on It

XDR Demands a New Approach to Security—and Business

Everybody wants to rule the world, at least according to that Tears for Fears song a few decades back. This principle certainly holds true in the cybersecurity market. With extended detection and response (XDR) and the newer advancement of Open XDR be… Continue reading XDR Demands a New Approach to Security—and Business

Data Clean Rooms for Innovation and Collaboration

Data, being a key enabler for innovation, growth, development and revenue, is the currency of the 21st century and an organization’s most valuable asset. Unlike a tangible asset, the value an organization can seek from data is endless; essentially, th… Continue reading Data Clean Rooms for Innovation and Collaboration

EU, U.S. Partner on Malware, Cybersecurity Defense

Last week, the world’s major democratic governments took steps to coordinate cybersecurity defenses, with the European Union and the United States launching an initiative to combat ransomware, which has become an increasingly critical national securit… Continue reading EU, U.S. Partner on Malware, Cybersecurity Defense