Security Analytics

Analytics and Intelligence

red team SEC data security privacy How to Bring DevOps and Security Teams Closer Together

Google Launches Red Team to Secure AI Systems Against Attacks

Google is rolling out a red team charged with testing the security of AI systems by running simulated but realistic attacks to uncover vulnerabilities or other weaknesses that could be exploited by ...
Security Boulevard
Future trends of Data Analytics

The Future of Data Analytics: 9 Emerging Trends and Technologies to Watch Out

In the rapidly evolving digital age, data has become the new currency, and organizations are harnessing its power to gain valuable insights and make informed...Read More The post The Future of Data ...
Aruba Advances IoT Cybersecurity

IoT Connected Devices Pose Significant Risk to Organizations

Security flaws in connected devices and the IoT are plaguing the digital landscape, impacting a broad range of industries ...
Security Boulevard
GitHub satellite cyberattack Strontium cyberwarfare counter-drone The Legality of Waging War in Cyberspace

GitHub Developers Targeted by North Korea’s Lazarus Group

The Lazarus Group is behind a social engineering campaign that uses repository invitations and malicious npm packages to target developers on GitHub ...
Security Boulevard
supply chain SMB Cowbell Cyber cyberattack colonial ransomware insurance attacks access

Software Supply Chain Attackers Targeting Banks, Checkmarx Says

Two banks earlier this year were the targets of open source supply chain attacks, the first of their kind in the industry ...
Security Boulevard
Kevin Mitnick

R.I.P. Kevin Mitnick, 1963–2023

Kevin is Free: Hackers’ hacker dies, aged 59 ...
Security Boulevard
quantum data scraping

Cleantech and Quantum Computing: Critical Infrastructure Cybersecurity

As cleantech becomes a bigger part of U.S. critical infrastructure, it faces a bigger risk from cyberattackers leveraging quantum attacks ...
Security Boulevard
QR codes ransomware, attacks, RaaS, SlashNext ransomware phishing attack

The Rise of QR Codes Spurs Rise in ‘Fresh Phish’

Miscreants have ramped up their use of QR codes to phish for credentials, according to INKY threat researchers ...
Security Boulevard

AI and Microdirectives

Imagine a future in which AIs automatically interpret—and enforce—laws. All day and every day, you constantly receive highly personalized instructions for how to comply with the law, sent directly by your government ...