red team SEC data security privacy How to Bring DevOps and Security Teams Closer Together

Google Launches Red Team to Secure AI Systems Against Attacks

Google is rolling out a red team charged with testing the security of AI systems by running simulated but realistic attacks to uncover vulnerabilities or other weaknesses that could be exploited by ...
Security Boulevard
TeamViewer, insider, application, insider risk, case, threat Palo Alto network IP theft

Insider Indicted for Attempting to Sabotage California Water Plant

Earlier this month, Rambler Gallo pled not guilty to charges that he attempted to sabotage the water treatment facility in Discovery Bay, California. The facility provides treatment for the water and wastewater ...
Security Boulevard
Understanding the Importance of a HIPAA Audit Log in Compliance

Understanding the Importance of a HIPAA Audit Log in Compliance

A HIPAA audit log, also known as an audit trail, is a chronological record of access to electronic protected health information (ePHI). The post Understanding the Importance of a HIPAA Audit Log ...
Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...
Crossing the road

Crossing the road

| | Cybersecurity
Last week I spoke for Jersey Cyber Security Centre ( CERT.JE) about the changing threats facing us — from the very active offensive cyber campaign forming part of the war in Ukraine, to the ...
GitHub satellite cyberattack Strontium cyberwarfare counter-drone The Legality of Waging War in Cyberspace

GitHub Developers Targeted by North Korea’s Lazarus Group

The Lazarus Group is behind a social engineering campaign that uses repository invitations and malicious npm packages to target developers on GitHub ...
Security Boulevard
supply chain SMB Cowbell Cyber cyberattack colonial ransomware insurance attacks access

Software Supply Chain Attackers Targeting Banks, Checkmarx Says

Two banks earlier this year were the targets of open source supply chain attacks, the first of their kind in the industry ...
Security Boulevard
Setting Up DKIM on On-Prem Exchange Servers

Setting Up DKIM on On-Prem Exchange Servers

| | Cybersecurity
This is a comprehensive guide on how to deploy DKIM on On-prem exchange servers by installing the free Exchange DKIM Signer ...

What is a Customer Experience Reference Architecture?  

Creating and deploying a customer experience reference architecture is tricky, but microsegmentation can drastically increase the chances of success  Customer experience reference architecture is the structured framework or model that provides guidance ...

AI Alone Is Not the Answer to Cybersecurity; Humans Are Needed

The substantial rise in cybercrime in the past few years has generated a tremendous market for artificial intelligence (AI)-driven cybersecurity products. The global AI market totaled $428 billion in 2022 and is ...