Is Your VPN Tracking (and Leaking) User Activity?

The VPN industry touts all sorts of privacy protocols and encryption methods that purport to protect users. While this is, undoubtedly, important information, and is a decent way to compare and contrast different VPN services, it isn’t the full story … Continue reading Is Your VPN Tracking (and Leaking) User Activity?

Italian Vaccine Sites Shut Down by Ransomware Thugs

Some Italian healthcare websites and their backroom systems have been wiped off the internet by malware.
The post Italian Vaccine Sites Shut Down by Ransomware Thugs appeared first on Security Boulevard.
Continue reading Italian Vaccine Sites Shut Down by Ransomware Thugs

How SASE Enables Zero-Trust

On this episode of The View With Vizard, Mike Vizard talks with Kelly Ahuja, CEO of Versa Networks about their latest $84 million funding round and the ways SASE enables zero-trust. The video is below followed by a transcript of the conversation. Anno… Continue reading How SASE Enables Zero-Trust

Developing Best Practices for API Security

APIs are pivotal to the overall success of a digital transformation. They allow developers to work across the digital assets and across multiple systems with ease. More organizations are adopting API initiatives, and are approaching digital transforma… Continue reading Developing Best Practices for API Security

Data Laundering Poses Privacy, Security Risks

Data laundering, like money laundering, is the act of acquiring data through an illegal means—whether that’s the dark web or a hacked/stolen database—and then taking that data and running it through a legitimate business or process in order to make th… Continue reading Data Laundering Poses Privacy, Security Risks

5 Benefits of Disaster Recovery in the Cloud

Any good disaster recovery (DR) plan mitigates against a variety of different scenarios that might bring a service down or otherwise cause an incident. Good DR plans also connect those scenarios to goals such as high availability (HA), plus metrics fo… Continue reading 5 Benefits of Disaster Recovery in the Cloud

Ransomware Attacks Leave Lasting Damage

Organizations hit by ransomware attacks also report tightened budgets and lingering impacts on productivity, profitability and security posture, suggesting the extensive damage caused in the wake of ransomware attacks has long-lasting effects. A Keepe… Continue reading Ransomware Attacks Leave Lasting Damage

U.S., UK and Australia Issue Joint Cybersecurity Advisory

As vulnerabilities are discovered, advisories are issued, remedies and mitigations are shared and then the onus is on the end user and/or company to do what’s necessary to close the window into their infrastructure. That is what happens in a per… Continue reading U.S., UK and Australia Issue Joint Cybersecurity Advisory

Estonian Hacker Steals 300,000 Government ID Photos

Estonia’s electronic ID system was hacked last week. Again. A suspect is in custody.
The post Estonian Hacker Steals 300,000 Government ID Photos appeared first on Security Boulevard.
Continue reading Estonian Hacker Steals 300,000 Government ID Photos

Cyberresilience: Your Data Insurance Policy

In the wake of the Colonial Pipeline hack, businesses all over the world are getting a very loud reminder that they could be next to be compromised by a ransomware intrusion. For many, it’s not an ‘if,’ but a case of how and when. Even mul… Continue reading Cyberresilience: Your Data Insurance Policy