Ask Chloé: Reducing Biased Language in Job Descriptions

Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé discusses the need to change job description language to be mo… Continue reading Ask Chloé: Reducing Biased Language in Job Descriptions

14 Flaws in NicheStack Leave PLCs, OT Controllers Vulnerable

Considering that OT environments are increasingly in the crosshairs of attackers, the 14 vulnerabilities that JFrog and Forescout Research Labs recently discovered in NicheStack should make the likes of Siemens, Schneider Electric and Rockwell Automat… Continue reading 14 Flaws in NicheStack Leave PLCs, OT Controllers Vulnerable

The Human Touch in Identity Verification

Businesses and consumers alike are growing more dependent on AI every day. The technology serves as the foundation of almost every digital assistant, search engine, online shopping recommendation or automated technology we currently use. Its reach onl… Continue reading The Human Touch in Identity Verification

Supply Chain Security – Not As Easy As it Looks

The massive exploit of SolarWinds is a prime example of what is called a “supply chain” vulnerability. The vast majority of those impacted by the Russian SolarWinds attack probably had never even heard of the company SolarWinds, and did not realize th… Continue reading Supply Chain Security – Not As Easy As it Looks

SHOCKER: Senate Says Security Sucks—Still

A Senate committee graded cybersecurity as poor among eight big agency departments. Not much has changed since the last report.
The post SHOCKER: Senate Says Security Sucks—Still appeared first on Security Boulevard.
Continue reading SHOCKER: Senate Says Security Sucks—Still

Health Care Security Must Mature With 5G

It’s clear that 5G technology is rapidly coming of age, and is enjoying wide adoption across every industry. According to Gartner, the market for 5G infrastructure was predicted to hit $4.2 billion over the past year, with two-thirds of companies depl… Continue reading Health Care Security Must Mature With 5G

Threat Hunting Enables Early Detection and Response

From recent ransomware attacks on meatpacking giant JBS and oil transporter Colonial Pipeline to the massive SolarWinds breach that rattled both the public and private sectors, disruptive, costly and headline-making cyberattacks are happening at an al… Continue reading Threat Hunting Enables Early Detection and Response

Report Finds Software Supply Chains Rife with Vulnerabilities

A report published today by application security testing tool provider GrammaTech in collaboration with Osterman Research suggests just about every software supply chain is rife with vulnerabilities. An analysis of commercial off-the-shelf (COTS) appl… Continue reading Report Finds Software Supply Chains Rife with Vulnerabilities

When it Comes to SASE, Trust but Verify

The last 18 months raised important questions about what work looks like, where it happens and which applications count as truly “business-critical.” In some ways, though, the worldwide scramble to rethink enterprise IT was long overdue. The fact is, … Continue reading When it Comes to SASE, Trust but Verify

When it Comes to SASE, Trust but Verify

The last 18 months raised important questions about what work looks like, where it happens and which applications count as truly “business-critical.” In some ways, though, the worldwide scramble to rethink enterprise IT was long overdue. The fact is, … Continue reading When it Comes to SASE, Trust but Verify