FIDO2 is a modern authentication group term for passwordless authentication. The Fast Identity Online (FIDO) Alliance developed it to replace the use of legacy known passwords and provide a secure method to authenticate using a physical or embedded key. FIDO2 is…
Tag: Security Boulevard
USENIX Security ’23 – A Bug’s Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs – Distinguished Paper Award Winner
Authors/Presenters: Gertjan Franken, Tom Van Goethem, Lieven Desmet, Wouter Joosen Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim…
GenAI Continues to Dominate CIO and CISO Conversations
The NASCIO Midyear Conference this past week highlighted the good, the bad and the scary of generative AI, as well as the vital importance of the data that states are using to feed large language models. The post GenAI Continues…
RSAC 2024 Innovation Sandbox | Reality Defender: Deepfake Detection Platform
The RSA Conference 2024 will kick off on May 6. Known as the “Oscars of Cybersecurity,” the RSAC Innovation Sandbox has become a benchmark for innovation in the cybersecurity industry. Today, let’s get to know the company Reality Defender. Introduction to…
USENIX Security ’23 – Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs
Authors/Presenters: Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li Qiushi Wu, Mathias Payer, Bing Mao Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from…
The Real Risk is Not Knowing Your Real Risk: Perspectives from Asia Pacific Tour with EY
Recently, I wrapped up my first work trip with Balbix—a whirlwind tour of customer roundtables in Singapore, Melbourne and Sydney. We were joined by local EY teams that have been working with us for almost an entire year to explore…
Airsoft Data Breach Exposes Data of 75,000 Players
Failure to configure authentication allowed malicious actors to exploit Airsoftc3.com’s database, exposing the sensitive data of a vast number of the gaming site’s users. The post Airsoft Data Breach Exposes Data of 75,000 Players appeared first on Security Boulevard. This…
CEO Discusses MDR Service With a Risk-Based Approach
Every organization has its own combination of cyber risks, including endpoints, internet-connected devices, apps, employees, third-party vendors, and more. Year after year, the risks continue to grow more complex and new threats emerge as threat actors become more sophisticated and…
The impact of automating open source dependency management
Recently, I chatted with developers from a customer in a heavily regulated industry. They were manually updating their open source dependencies and wanted to find a better solution to save time. Keeping their dependencies up-to-date was very time-consuming but something…
Palo Alto Networks Extends SASE Reach to Unmanaged Devices
Prisma SASE 3.0 promises to make it simpler and faster to apply zero-trust policies. The post Palo Alto Networks Extends SASE Reach to Unmanaged Devices appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…