red team SEC data security privacy How to Bring DevOps and Security Teams Closer Together

Google Launches Red Team to Secure AI Systems Against Attacks

Google is rolling out a red team charged with testing the security of AI systems by running simulated but realistic attacks to uncover vulnerabilities or other weaknesses that could be exploited by ...
Security Boulevard

BSides Leeds 2023 – BSides Leeds Orga – Opening Remarks

Thanks are in order to BSides Leeds for publishing their presenter’s outstanding BSides Leeds 2023 security content on the organizations’ YouTube channel. Permalink ...
Randall Munroe’s XKCD ‘Global Atmospheric Circulation’

Randall Munroe’s XKCD ‘Global Atmospheric Circulation’

via the comic artistry and dry wit of Randall Munroe, resident at XKCD! Permalink ...
Future trends of Data Analytics

The Future of Data Analytics: 9 Emerging Trends and Technologies to Watch Out

In the rapidly evolving digital age, data has become the new currency, and organizations are harnessing its power to gain valuable insights and make informed...Read More The post The Future of Data ...
Aruba Advances IoT Cybersecurity

IoT Connected Devices Pose Significant Risk to Organizations

Security flaws in connected devices and the IoT are plaguing the digital landscape, impacting a broad range of industries ...
Security Boulevard
TeamViewer, insider, application, insider risk, case, threat Palo Alto network IP theft

Insider Indicted for Attempting to Sabotage California Water Plant

Earlier this month, Rambler Gallo pled not guilty to charges that he attempted to sabotage the water treatment facility in Discovery Bay, California. The facility provides treatment for the water and wastewater ...
Security Boulevard
Understanding the Importance of a HIPAA Audit Log in Compliance

Understanding the Importance of a HIPAA Audit Log in Compliance

A HIPAA audit log, also known as an audit trail, is a chronological record of access to electronic protected health information (ePHI). The post Understanding the Importance of a HIPAA Audit Log ...
GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

Accessing vital information to complete day-to-day tasks at our jobs still requires using a password-based system at most companies. Related: Satya Nadella calls for facial recognition regulations Historically, this relationship has been ...