Category: Security Boulevard

How to Get CMMC Certified

This quick guide breaks down the steps of achieving CMMC so your business can protect sensitive government data. The post How to Get CMMC Certified appeared first on Scytale. The post How to Get CMMC Certified appeared first on Security…

Massive AT&T Data Leak, The Danger of Thread Hijacking

Episode 324 features discussions on a significant AT&T data breach affecting 73 million customers and a sophisticated thread jacking attack targeting a journalist. Co-host Scott Wright joins the discussion, highlighting how millions of AT&T customer account passcodes, along with personal…

9 Best Practices for Using AWS Access Analyzer

Maintaining a strong security posture is crucial in today’s digital landscape, and it begins with users. Trusting users with access to sensitive data and company assets is a web of complexity, and one bad apple or security gap can knock…

Salt Security Applies Generative AI to API Security

Salt Security claims Pepper can decrease the time it takes to surface actionable security-related information by as much as 91% . The post Salt Security Applies Generative AI to API Security appeared first on Security Boulevard. This article has been…

Ivanti CEO Promises Stronger Security After a Year of Flaws

The chief executive of vulnerability-plagued Ivanti said the management software maker is revamping its security practices after months of reports of China-linked and other attackers exploiting the flaws. In an open letter to customers and partners, accompanied by a six-minute…

CISA Unveils Critical Infrastructure Reporting Rule

The Cybersecurity and Infrastructure Security Agency (CISA) issued a Notice of Proposed Rulemaking (NPRM) for the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) of 2022. Under this rule, covered entities must report significant cyber incidents within 72 hours of…

Proactive and Reactive Ransomware Protection Strategies

Preemptive protection and reactive cybersecurity strategies for best possible ransomware protection  We live in a time where digital transformation dictates the pace of business, and the necessity for ransomware protection strategies and preemptive protection is essential to organizational integrity and…