Ask Chloé: Returning to the Office

Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé discusses cybersecurity companies’ push to return worker… Continue reading Ask Chloé: Returning to the Office

Threat Modeling in the Age of Automation

Cybersecurity threats are rising fast, leading enterprises that build applications to look more closely at security measures built on precautionary principles, including threat modeling, which has become core to ensuring applications can withstand fut… Continue reading Threat Modeling in the Age of Automation

Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets

Apple’s under fire yet again for iOS security bugs in WebKit—the code behind the Safari browser.
The post Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets appeared first on Security Boulevard.
Continue reading Apple Safari Leaks Cookies, so ‘Russia-Backed’ Hackers Attack Targets

Disrupting Ransomware with Advanced File System Techniques

Technology is becoming more effective at early ransomware detection. Solutions can often automatically shut down attacks and minimize the damage. It is reasonable to conclude, however, that there is no truly impenetrable ransomware defense. The more c… Continue reading Disrupting Ransomware with Advanced File System Techniques

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary Coast of northern Africa. The Barbary States had been the scourge of the seas for centuries. They raided coastal … Continue reading Barbary Pirates and Russian Cybercrime

Where Did REvil Ransomware Go? Will it Be Back?

Speculation swirled over why the prolific and dangerous REvil ransomware went offline – blog, payment processing, all suddenly went kaput – it’s important not to lose sight of the bigger issues. While the ransomware is gone, at least for the time bein… Continue reading Where Did REvil Ransomware Go? Will it Be Back?

Salt Security Report Highlights Prevalence of API Vulnerabilities

Salt Security, a provider of a platform for securing application programming interfaces (APIs), today published a report that reveals the existence of vulnerabilities in APIs in an unidentified platform employed widely in the financial services indust… Continue reading Salt Security Report Highlights Prevalence of API Vulnerabilities

Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch

Amazon’s Ring unit is moving ahead with plans to allow end-to-end encryption (E2EE).
The post Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch appeared first on Security Boulevard.
Continue reading Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch

Zero-Trust for the Post-Pandemic World

More than a year after the start of the COVID-19 pandemic, we’re seeing most companies either maintaining their remote work policies or slowly moving to a hybrid work model. In fact, an estimated 36.2 million Americans will be working remotely by 2025… Continue reading Zero-Trust for the Post-Pandemic World

Security in the Age of Increasing Cyberattacks

In June 2021, I was discussing with a colleague why, despite all the discourse about security, we continue to read about cybersecurity attacks. On that same day, the Belgian city of Liege announced that it had been the victim of a ransomware attack. D… Continue reading Security in the Age of Increasing Cyberattacks