CISOs Say Application Security is Broken

Nearly three-quarters of CISOs aren’t confident that code in cloud-native architectures is free of vulnerabilities before it goes into production, according to research from Dynatrace. The report, based on a global survey of 700 CISOs in large enterpr… Continue reading CISOs Say Application Security is Broken

EA’s Source: It’s in the Game (and in Hackers’ Hands)

Electronic Arts got hacked, and its source code stolen. Hackers took hundreds of gigabytes of game source code and tools.
The post EA’s Source: It’s in the Game (and in Hackers’ Hands) appeared first on Security Boulevard.
Continue reading EA’s Source: It’s in the Game (and in Hackers’ Hands)

Deloitte Acquires CloudQuest to Gain CSPM Platform

Deloitte this week announced it is acquiring CloudQuest to gain a cloud security posture management (CSPM) platform that it will now make available as part of the portfolio of security services it provides. Terms of the deal were not disclosed. Vikram… Continue reading Deloitte Acquires CloudQuest to Gain CSPM Platform

Ask Chloé: Personal Burnout

Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides advice to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé addresses burnout, which is a common problem in InfoSec.  … Continue reading Ask Chloé: Personal Burnout

Ask Chloé: Personal Burnout

Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides advice to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé addresses burnout, which is a common problem in InfoSec.  … Continue reading Ask Chloé: Personal Burnout

Can the Government Compel You To Produce Records That Don’t Exist Yet?

We all know that the government can get a subpoena compelling you to produce records that are in your “possession, custody or control,” provided those records are not privileged, along with a few other constraints. They can also get a search warrant a… Continue reading Can the Government Compel You To Produce Records That Don’t Exist Yet?

Who Wore It Better? JBS Paid Ransom, Fujifilm Did Not

If those burgers you throw on the grill are even more expensive this summer, this might be one of the reasons. Meat processor JBS USA paid out $11 million to hackers after a ransomware attack compelled it to shutter beef processing in the U.S. and par… Continue reading Who Wore It Better? JBS Paid Ransom, Fujifilm Did Not

Genius! Apple Bribes Woman over Naked Pic Theft

Apple is under fire for its hypocrisy in the case of techs who stole naked pictures and video from a woman’s iPhone.
The post Genius! Apple Bribes Woman over Naked Pic Theft appeared first on Security Boulevard.
Continue reading Genius! Apple Bribes Woman over Naked Pic Theft

IT Service Desk Security a Weak Point for Organizations

IT service desks are a security weak point for many businesses, with nearly half of organizations lacking a user verification policy for incoming calls. This was just one of the findings of a Specops Software survey of more than 200 IT leaders from th… Continue reading IT Service Desk Security a Weak Point for Organizations

Palo Alto Networks Extends Scope of CSPM Platform

Palo Alto Networks today updated its cloud security posture management (CSPM) platform to include a range of capabilities that make it simpler for security teams to prioritize which cloud threats they respond to first. Ankur Shah, vice president of pr… Continue reading Palo Alto Networks Extends Scope of CSPM Platform