Safe Security risk What’s Causing CISOs Stress

Safe Security Buys RiskLens to Advance Cybersecurity Risk Management

Safe Security acquired RiskLens, a pioneer in the development of the Factor Analysis of Information Risk (FAIR) quantification standard for assessing cybersecurity risk ...
Security Boulevard
Pepsi PBV data breach deep fakes Astoria Company hack

Third Party Lets Pepsi Data Out of the Bottle, PII Nicked

Current and former contractors and employees at Pepsi Bottling Ventures LLC (PBV) were victims of a security incident that exposed their personal information ...
Security Boulevard
NETSCOUT cybersecurity, attacks resources security challenges tools breach API attacker Radware Report Sees Major Spike in DDoS Attacks

NETSCOUT Uses Machine Learning to Help Thwart DDoS Attacks

NETSCOUT Systems is is dynamically applying machine learning algorithms to combat distributed denial-of-service (DDoS) attacks ...
Security Boulevard
SpyCloud MFA Systems Vulnerable Authentication Bypass

Concerns About Infostealer Malware on the Rise

A SpyCloud report found more than half of respondents are extremely concerned about their ability to thwart attacks that exfiltrate authentication data ...
Security Boulevard
StackRot: Linux Bug so bad Linus Dives Into Code to Fix It

StackRot: Linux Bug so bad Linus Dives Into Code to Fix It

Maple Tree Side Effects: Torvalds feels the pressure, fixes lazy locks ...
Security Boulevard
SOC Leveraging the Cloud for SOC 2 Compliance

Finding the Right Tools for Response and Visibility in the SOC

One of the more difficult tasks for a cybersecurity professional—from the CISO to the person responsible for log management in the SOC—is to convey the importance of security, compliance and governance to ...
Security Boulevard
Solar array, ground mounted in field, under blue sky

Contec SolarView: Critical Bug Unpatched After 14 MONTHS

PV OT: VPN PDQ! 9.8 CVSS known since May 2022—but still exploitable on 400+ net-connected OT/ICS/SCADA systems ...
Security Boulevard
Training Machine Learning

Using Machine Learning to Find Vulnerabilities and Prevent Cyberattacks

By implementing ML, organizations can detect a network intrusion, find the anomaly and stop it before any damage is caused.  ...
Security Boulevard