In the ever-evolving landscape of corporate sustainability, the European Union’s Corporate Sustainability Reporting Directive (CSRD) stands as a landmark regulation, redefining reporting obligations for businesses operating within or having a significant presence in the EU. Among those impacted are data…
Category: Security Boulevard
How to Escape the 3 AM Page as a Kubernetes Site Reliability Engineer
It’s Saturday night. You’re out to dinner with friends. Suddenly, a familiar tune emits from your pocket. Dread fills you as you fish your phone out of your pocket and unlock it. You tap the alert. Maybe it’s a lucky…
A Deep Dive on the xz Compromise
xz is a widely distributed package that provides lossless compression for both users and developers, and is included by default in most, if not all, Linux distributions. Created in 2009, it has since released numerous versions. As an open-source project,…
Chrome’s Incognito Mode Isn’t as Private as You Think — but Google’s Not Sorry
Short term gain for long term pain? Class action attorney David Boies asked for $5,000 per user, but got nothing—except some assurances Google will delete data it no longer needs. The post Chrome’s Incognito Mode Isn’t as Private as You…
The Challenges of Zero Trust 800-207 and Advocating for Prescriptive Controls
In the rapidly evolving cybersecurity landscape, a Zero Trust (ZT) model has emerged as a beacon of hope, promising enhanced security posture and protection against sophisticated cyber threats. Documented in NIST Special Publication 800-207, Zero Trust Architecture (ZTA) advocates abandoning…
Chrome’s Incognito Mode: Not as Private as You Think — but Google’s not Sorry
Short term gain for long term pain? Class action attorney David Boies asked for $5,000 per user, but got nothing—except some assurances Google will delete data it no longer needs. The post Chrome’s Incognito Mode: Not as Private as You…
Sophos: Backups are in the Crosshairs of Ransomware Groups
When thinking about ransomware, enterprises that ignore their data backups do so at their own peril, according to cybersecurity firm Sophos. Protecting backups will significantly reduce the harm to a company hit by a ransomware attack and the need to…
SBOMs are now essential: Make them actionable to better manage risk
All kinds of organizations, whether they sell software or only purchase it, can benefit from knowing what their software contains. The number of software supply chain attacks in recent years and the multitude of attack methods cybercriminals are now using…
Why risk management is key for Oracle ERP Cloud Success
Why Risk Management is key for Oracle ERP Cloud Success Insight from ERP Risk Advisors and SafePaaS”Go live” is a crucial step in any digital transformation project. However, the path to a successful Oracle ERP cloud go-live is challenging and…
In the News | State Governments Can Boost K-12 Cybersecurity
This article was originally published on Government Technology on 3.11.24 by Charlie Sander, CEO at ManagedMethods. From new laws to the K-12 “SIX Essentials Series,” the NIST framework and assessments from the Department of Homeland Security, schools have state backup…