Helping security teams respond to gaps in security and compliance programs with Qualys CSAM

Unlike traditional inventory tools that focus solely on visibility or rely on third-party solutions to collect security data, Qualys CyberSecurity Asset Management (CSAM) is an all-in-one solution. In this interview with Help Net Security, Edward Rossi… Continue reading Helping security teams respond to gaps in security and compliance programs with Qualys CSAM

Grandchild of Rowhammer: ‘Half-Double’ Tactic Flips Farther Bits

Rowhammer has a new variant. And it’s been made easier: DDR4 memory is getting denser, so the individual bits are physically closer together.
The post Grandchild of Rowhammer: ‘Half-Double’ Tactic Flips Farther Bits appeared first on Security Boulevar… Continue reading Grandchild of Rowhammer: ‘Half-Double’ Tactic Flips Farther Bits

Code Itself Is a Growing Security Threat

As the pace of digitization across the global economy accelerates, companies are creating more and more software. This is putting greater pressure on internal teams to deliver on schedule, within budget and to stay ahead of security vulnerabilities. T… Continue reading Code Itself Is a Growing Security Threat

Supreme Court To Decide Scope of Federal Hacking Law

For more than 30 years, the federal computer hacking statute has been used by companies to sue employees (and former employees), competitors and even customers and users who violate their rules on the use of computers, computer databases and data glea… Continue reading Supreme Court To Decide Scope of Federal Hacking Law

How Biden’s EO Impacts Cybersecurity Players

On May 12, the Biden Administration released an executive order aimed at government agencies, vendors and developers, who all will have to design their products with a greater focus on security. The EO on “Improving the Nation’s Cybersecurity” comes i… Continue reading How Biden’s EO Impacts Cybersecurity Players

Apple Patches Zero-Day XCSSET Exploit

By the time Apple patched a zero-day vulnerability in macOS 11.4 that bypasses the Transparency Consent and Control (TCC) framework, it was being exploited by attackers using XCSSET malware. Jamf researchers dissecting the malware and its exploitation… Continue reading Apple Patches Zero-Day XCSSET Exploit

Breach Clarity Weekly Data Breach Report: Week of May 24

Each week Breach Clarity, recently acquired by Sontiq, compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score … Continue reading Breach Clarity Weekly Data Breach Report: Week of May 24

Top 20 Fastest Growing Cybersecurity Companies in Q1 2021

If you track 2,635 cybersecurity companies, as I do, how do you know which ones to pay attention to? Those with PR teams that reach out to brief you? They often have a great story to tell and have some interesting new technology to demonstrate. New fu… Continue reading Top 20 Fastest Growing Cybersecurity Companies in Q1 2021

Happy birthday GDPR: IoT impact and practical tips for compliance

With the GDPR now in its third year, compliance with the EU data privacy regulation is still a significant issue for organizations to tackle, especially especially when it comes to the Internet of Things (IoT). Additionally, with remote work currently … Continue reading Happy birthday GDPR: IoT impact and practical tips for compliance

Protecting the Hybrid Cloud With Zero-Trust

Cloud security is tough enough, but hybrid cloud adds a few extra challenges, such as visibility between cloud platforms and the difficulty of remaining current with compliance protocols for industry and government regulations. Is zero-trust the answe… Continue reading Protecting the Hybrid Cloud With Zero-Trust