Aviatrix today committed to building a security fabric that because it will run natively in cloud computing environments will enable cybersecurity teams to streamline workflows in a way that also promises to reduce total costs. The post Aviatrix to Build…
Category: Security Boulevard
New Bert Ransomware Evolves With Multiple Variants
An emerging ransomware group that calls itself Bert is quickly evolving after hitting the cybercrime scene in April, targeting both Windows and Linux systems used by organizations in the health care, tech, and other industries in the United States, Europe,…
Chinese Hacker Linked to Silk Typhoon Charged With Stealing COVID Data
A 33-year-old Chinese national linked to the Silk Typhoon espionage group was arrested in Italy on a U.S. warrant that accuses him of conspiring with others in hacks of U.S. COVID-19 vaccine researchers and exploiting flaws in Microsoft Exchange Server…
23andMe…and Everyone Else: All Eyes are on the Most Personal Data
As tempting as it is to find out if you descended from some grand poobah in Scandinavia or if your real great (x10) grandmother was Catherine the Great, the implications of a fine recently levied against 23andMe might coax you…
A Practical Guide to Building a Red Teaming Strategy for AI
Start your red teaming journey with intent, not ambition. Designate a lead with both AI literacy and a security mindset. The post A Practical Guide to Building a Red Teaming Strategy for AI appeared first on Security Boulevard. This article…
API Sprawl Can Trip Up Your Security, Big Time
The future of API security is not just about better firewalls — it is about smarter governance, automation and visibility at scale. The post API Sprawl Can Trip Up Your Security, Big Time appeared first on Security Boulevard. This article…
Your Agentic AI Governance Checklist: 7 Non-Negotiables to Fix Governance Blind Spots
When you design agentic AI with governance at the core, you stay ahead of risk and avoid reactive fire drills. The post Your Agentic AI Governance Checklist: 7 Non-Negotiables to Fix Governance Blind Spots appeared first on Security Boulevard. This…
How Monitoring Users’ Holistic Digital Identities Can Help Businesses Eliminate Cybercriminals’ Greatest Advantage
Businesses must take the threat of identity-based attacks seriously and adapt their cybersecurity practices to address this challenge. The post How Monitoring Users’ Holistic Digital Identities Can Help Businesses Eliminate Cybercriminals’ Greatest Advantage appeared first on Security Boulevard. This article…
Guiding Global Teams: Fostering Compliance and Creativity
With empowered advocates and continuous measurement, teams can navigate the fine line between compliance, rule adherence and creative freedom. The post Guiding Global Teams: Fostering Compliance and Creativity appeared first on Security Boulevard. This article has been indexed from Security…
U.S. Target North Korean IT Worker Scams with Raids, Indictments
The DOJ announced a far-reaching operation that aimed to knock out a substantial number of North Korean IT worker scams that have victimized more than 100 U.S. companies that unwittingly hired North Korean operatives as remote workers, who then stole…