6 Keys to Asset Protection for High-Net-Worth Individuals

Cybercriminals are using new and inventive strategies to target the personal assets of high-net-worth individuals. In the modern age, criminals can appropriate your assets and disrupt your personal privacy without ever stepping ...

New National Cybersecurity Strategy Will Require Compliance, Collaboration

The Biden administration’s recently released National Cybersecurity Strategy goes beyond the executive order it issued in 2021, which defined security measures any organization doing business with the federal government must follow. As ...

5 Ways to Reduce the Attack Surface for Microservices

Microservices is a software development approach where an application is divided into small, independent and loosely coupled services that work together to provide the application’s overall functionality. Each microservice is designed to ...
Security Boulevard

Orca Security Traces Cloud Vulnerabilities Back to Code

Orca Security today announced it added an ability to trace cloud security risks in production environments back to both the original code that created the issue and the developer that wrote it ...
Security Boulevard

Splunk: Cybersecurity Dynamics Rapidly Changing

A survey of 1,520 cybersecurity and IT leaders published today found more than half (52%) reporting their organization suffered a data breach in the past two years, with 62% experiencing monthly unplanned ...
Security Boulevard

Sysdig Details Proxyjacking Attack Leveraging Log4j Vulnerability

Sysdig today published a report that described how cybercriminals are exploiting the Log4j vulnerability to gain access to IP addresses that are then sold to entities that resell them. Dubbed proxyjacking, the ...
Security Boulevard

What the TikTok Ban Could Mean for GRC

The White House and TikTok’s critics in Congress have made it clear: They consider TikTok a dangerous social media app and national security threat. Throughout the March 23, 2023, congressional hearing, TikTok ...
Security Boulevard

Beyond SolarWinds: 6 More Notable Software Supply Chain Attacks

SolarWinds has become almost a household name and for all the wrong reasons: beginning in 2019, the system management company was the target of one of the largest software supply chain attacks ...

Western Digital Hacked: ‘My Cloud’ Data Dead (Even Local Storage!)

Déjà Vu: Hack of WD systems leads to My Cloud service outage. Owners unable to access files ...
Security Boulevard

Passkeys and Biometrics Can Thwart Bad Actors

Cybersecurity breaches are a constant threat, and it’s only getting worse. In 2021, 45% of US companies suffered data breaches related to compromised credentials, 42 million individuals suffered losses greater than $50 ...
Security Boulevard