securityboulevard.com Open in urlscan Pro
2606:4700:10::6816:29c  Public Scan

Submitted URL: http://securityboulevard.com/
Effective URL: https://securityboulevard.com/
Submission: On February 09 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://securityboulevard.com/

<form action="https://securityboulevard.com/" class="search-form searchform clearfix" method="get">
  <div class="search-wrap">
    <input type="text" placeholder="Search" class="s field" name="s">
    <button class="search-icon" type="submit"></button>
  </div>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1628905/4b9a2bbd-665c-447b-81df-233280dc689e

<form id="hsForm_4b9a2bbd-665c-447b-81df-233280dc689e" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1628905/4b9a2bbd-665c-447b-81df-233280dc689e"
  class="hs-form-private hsForm_4b9a2bbd-665c-447b-81df-233280dc689e hs-form-4b9a2bbd-665c-447b-81df-233280dc689e hs-form-4b9a2bbd-665c-447b-81df-233280dc689e_da830bf9-17fb-4690-9a5d-4cdd61b1d095 hs-form stacked"
  target="target_iframe_4b9a2bbd-665c-447b-81df-233280dc689e" data-instance-id="da830bf9-17fb-4690-9a5d-4cdd61b1d095" data-form-id="4b9a2bbd-665c-447b-81df-233280dc689e" data-portal-id="1628905"
  data-test-id="hsForm_4b9a2bbd-665c-447b-81df-233280dc689e">
  <div>
    <div class="hs-richtext hs-main-font-element">
      <p style="color: #fff;">Get breaking news, free eBooks and upcoming events delivered to your inbox.</p>
    </div>
  </div>
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-4b9a2bbd-665c-447b-81df-233280dc689e" class="" placeholder="Enter your " for="email-4b9a2bbd-665c-447b-81df-233280dc689e"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-4b9a2bbd-665c-447b-81df-233280dc689e" name="email" required="" placeholder="Enter your email address*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div>
    <div class="hs-richtext hs-main-font-element">
      <div style="text-align: center;"><a href="https://securityboulevard.com/privacy-policy/" style="color: #fff; font-size: 12px;">View Security Boulevard <u>Privacy Policy</u></a></div>
    </div>
  </div>
  <div>
    <div class="hs-richtext hs-main-font-element">
      <hr style="border: 1px solid #ccc; width: 100%; margin: 20px auto;">
    </div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe Now"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1707445369692&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1661184187789&quot;,&quot;clonedFromForm&quot;:&quot;d967bc1f-2d57-4dcf-861d-5930d7bea674&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;isLegacyThemeAllowed&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Home - Security Boulevard&quot;,&quot;pageUrl&quot;:&quot;https://securityboulevard.com/&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;contentType&quot;:&quot;standard-page&quot;,&quot;hutk&quot;:&quot;cb928e594be46244d2ba5a6d5c730c2e&quot;,&quot;__hsfp&quot;:2032787945,&quot;__hssc&quot;:&quot;90482629.1.1707445369956&quot;,&quot;__hstc&quot;:&quot;90482629.cb928e594be46244d2ba5a6d5c730c2e.1707445369956.1707445369956.1707445369956.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-da830bf9-17fb-4690-9a5d-4cdd61b1d095&quot;,&quot;rumScriptExecuteTime&quot;:2791.300000190735,&quot;rumTotalRequestTime&quot;:3093.2000007629395,&quot;rumTotalRenderTime&quot;:3210.5,&quot;rumServiceResponseTime&quot;:301.9000005722046,&quot;rumFormRenderTime&quot;:117.29999923706055,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1707445369963,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;1628905&quot;,&quot;formId&quot;:&quot;4b9a2bbd-665c-447b-81df-233280dc689e&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-da830bf9-17fb-4690-9a5d-4cdd61b1d095&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;da830bf9-17fb-4690-9a5d-4cdd61b1d095&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.4662&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.4662&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;4662&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1707445369800,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Home - Security Boulevard\&quot;,\&quot;pageUrl\&quot;:\&quot;https://securityboulevard.com/\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.139 Safari/537.36\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1707445369801,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1707445369961,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;cb928e594be46244d2ba5a6d5c730c2e\&quot;,\&quot;contentType\&quot;:\&quot;standard-page\&quot;}&quot;}]}"><iframe
    name="target_iframe_4b9a2bbd-665c-447b-81df-233280dc689e" style="display: none;"></iframe>
</form>

Text Content

Thursday, February 8, 2024
 * 
 * 
 * 
 * 
 * 
 * 
 * 


SECURITY BOULEVARD

The Home of the Security Bloggers Network


Community Chats Webinars Library


 * Home
   * Cybersecurity News
   * Features
   * Industry Spotlight
   * News Releases
 * Security Bloggers Network
   * Latest Posts
   * Syndicate Your Blog
   * Write for Security Boulevard
 * Webinars
   * Upcoming Webinars
   * Calendar View
   * On-Demand Webinars
 * Events
   * Upcoming Events
   * On-Demand Events
 * Sponsored Content
 * Chat
   * Security Boulevard Chat
   * Marketing InSecurity Podcast
   * Techstrong.tv Podcast
   * TechstrongTV - Twitch
 * Library
 * Related Sites
   * Techstrong Group
   * Cloud Native Now
   * DevOps.com
   * Security Boulevard
   * Techstrong Research
   * Techstrong TV
   * Techstrong.tv Podcast
   * Techstrong.tv - Twitch
   * Devops Chat
   * DevOps Dozen
   * DevOps TV
 * Media Kit
 * About
 * Sponsor



 * Analytics
 * AppSec
 * CISO
 * Cloud
 * DevOps
 * GRC
 * Identity
 * Incident Response
 * IoT / ICS
 * Threats / Breaches
 * More
   * Blockchain / Digital Currencies
   * Careers
   * Cyberlaw
   * Mobile
   * Social Engineering
 * Humor


Hot Topics
 * Bringing Composability to Firewalls with Runtime Protection Rules | Impart
   Security
 * New Web API V2
 * China-Sponsored Hackers Lie in Wait to Attack US Infrastructure
 * The Art of Bot Detection: How DataDome Uses Picasso for Device Class
   Fingerprinting
 * Linux Vendors Squawk: PATCH NOW — CVSS 9.8 Bootkit Bug in shim.efi

 * Bringing Composability to Firewalls with Runtime Protection Rules | Impart
   Security
 * New Web API V2
 * China-Sponsored Hackers Lie in Wait to Attack US Infrastructure
 * The Art of Bot Detection: How DataDome Uses Picasso for Device Class
   Fingerprinting
 * Linux Vendors Squawk: PATCH NOW — CVSS 9.8 Bootkit Bug in shim.efi



CHINA-SPONSORED HACKERS LIE IN WAIT TO ATTACK US INFRASTRUCTURE

Feb 8 | Jeffrey Burt

LINUX VENDORS SQUAWK: PATCH NOW — CVSS 9.8 BOOTKIT BUG IN SHIM.EFI

Feb 8 | Richi Jennings

REPORT DETAILS SCOPE OF GLOBAL THREAT TO ELECTIONS

Feb 8 | Michael Vizard

RANSOMWARE PAYMENTS IN 2023 HIT $1 BILLION: CHAINALYSIS

Feb 8 | Jeffrey Burt

GOOGLE PUSHES SOFTWARE SECURITY VIA RUST, AI-BASED FUZZING

Feb 7 | Jeffrey Burt


ANALYTICS AND INTELLIGENCE

Cloud Security Cybersecurity Data Security Featured IoT & ICS Security Network
Security News Security Boulevard (Original) Social - Facebook Social -
LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 


CHINA-SPONSORED HACKERS LIE IN WAIT TO ATTACK US INFRASTRUCTURE

February 8, 2024 Feb 8 | Jeffrey Burt 0

Cloud Security Cybersecurity Data Security Deep Fake and Other Social
Engineering Tactics Governance, Risk & Compliance Network Security Security
Boulevard (Original) Social Engineering Threat Intelligence 


THE NEXT YEAR IN CYBERSECURITY: QUANTUM, GENERATIVE AI AND LLMS & PASSWORDS

February 8, 2024 Feb 8 | Federico Charosky 0
Analytics & Intelligence Application Security Cybersecurity Data Privacy Data
Security Governance, Risk & Compliance Incident Response Industry
Spotlight Mobile Security Security Boulevard (Original) Social - X Social
Engineering Threat Intelligence Threats & Breaches Vulnerabilities 


HOW TO ENRICH DATA FOR FRAUD REDUCTION, RISK MANAGEMENT AND MITIGATION IN BFSI

February 8, 2024 Feb 8 | Anthony Deighton 0
More Analytics and Intelligence


APPLICATION SECURITY

Application Security Cloud Security Cloud Security Cybersecurity Data
Privacy Data Security Deep Fake and Other Social Engineering
Tactics DevOps DevSecOps Editorial Calendar Endpoint Featured Governance, Risk &
Compliance Humor Identity & Access Identity and Access Management Incident
Response Industry Spotlight Insider Threats IOT IoT & ICS
Security Malware Mobile Security Most Read This Week Network
Security News Popular Post Ransomware Securing Open Source Securing the
Cloud Securing the Edge Security at the Edge Security Awareness Security
Boulevard (Original) Security Challenges and Opportunities of Remote
Work Security Operations Social - Facebook Social - LinkedIn Social - X Social
Engineering Software Supply Chain Security Spotlight Threats &
Breaches Vulnerabilities Zero-Trust 


LINUX VENDORS SQUAWK: PATCH NOW — CVSS 9.8 BOOTKIT BUG IN SHIM.EFI

February 8, 2024 Feb 8 | Richi Jennings 0

Application Security Security Bloggers Network 


NSFOCUS WAF SECURITY REPORTS

February 7, 2024 Feb 7 | NSFOCUS 0
API Security Application Security Cloud Security Cloud
Security Cyberlaw Cybersecurity Data Privacy Deep Fake and Other Social
Engineering Tactics Editorial Calendar Endpoint Featured Governance, Risk &
Compliance Humor Identity & Access Incident Response Industry Spotlight IOT IoT
& ICS Security Malware Mobile Security Most Read This Week Network
Security News Popular Post Ransomware Securing Open Source Securing the
Cloud Securing the Edge Security at the Edge Security Awareness Security
Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social
Engineering Software Supply Chain Security Spotlight Threats &
Breaches Vulnerabilities Zero-Trust 


‘TOTAL BOLLOCKS’ — NO, YOUR TOOTHBRUSH ISN’T DDOS’ING

February 7, 2024 Feb 7 | Richi Jennings 0
More Application Security


CISO

CISO Suite Cybersecurity Data Security Governance, Risk & Compliance Network
Security Security Awareness Security Boulevard (Original) Social -
Facebook Social - X Social Engineering Threat Intelligence Threats &
Breaches Zero-Trust 


WHY AN HR-IT PARTNERSHIP IS CRITICAL FOR MANAGING CYBERSECURITY RISK

February 6, 2024 Feb 6 | Guarav Belani 0

CISO Suite Governance, Risk & Compliance Security Bloggers
Network Vulnerabilities 


RBVM CUSTOMIZED DASHBOARDS: CFO TEMPLATE

February 6, 2024 Feb 6 | Akhil Reni 0
CISO Suite Security Bloggers Network 


STRATEGIC DECISION-MAKING: BALANCING BUDGETS AND SECURITY

February 5, 2024 Feb 5 | Tony Bradley 0
More CISO


CLOUD SECURITY

Cloud Security Cybersecurity Data Security Featured Industry
Spotlight Malware Mobile Security Network Security News Security Boulevard
(Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat
Intelligence Threats & Breaches 


RANSOMWARE PAYMENTS IN 2023 HIT $1 BILLION: CHAINALYSIS

February 8, 2024 Feb 8 | Jeffrey Burt 0

AI and Machine Learning in Security AI and ML in Security Cloud
Security Cybersecurity Data Privacy Data Security Deep Fake and Other Social
Engineering Tactics Identity & Access Network Security Security Boulevard
(Original) Threat Intelligence Threats & Breaches Vulnerabilities 


2024 CYBERTHREAT FORECAST: AI ATTACKS, PASSKEY SOLUTIONS AND SMBS IN THE
CROSSHAIRS

February 8, 2024 Feb 8 | John Bennett 0
Cloud Security Security Bloggers Network 


GOOGLE CYBERSECURITY ACTION TEAM THREAT HORIZONS REPORT #9 IS OUT!

February 7, 2024 Feb 7 | Anton Chuvakin 0
More Cloud Security


DEVOPS SECURITY

Cloud Security Cybersecurity Data Security DevOps Featured Industry
Spotlight Mobile Security Network Security News Security Boulevard
(Original) Social - Facebook Social - LinkedIn Social -
X Spotlight Vulnerabilities 


GOOGLE PUSHES SOFTWARE SECURITY VIA RUST, AI-BASED FUZZING

February 7, 2024 Feb 7 | Jeffrey Burt 0

DevOps Security Bloggers Network 


COMIC AGILÉ – MIKKEL NOE-NYGAARD, LUXSHAN RATNARAVI – #277 – WHEN FIXING A
LEGACY SYSTEM

February 6, 2024 Feb 6 | Marc Handelman 0
DevOps Security Bloggers Network 


PULUMI VS TERRAFORM: THE DEFINITIVE GUIDE TO CHOOSING YOUR IAC TOOL

February 5, 2024 Feb 5 | Guest Expert 0
More DevOps Security


INCIDENT RESPONSE

Analytics & Intelligence Cybersecurity Data Privacy Data Security Incident
Response Malware Security Boulevard (Original) Social - X Threat
Intelligence Threats & Breaches Vulnerabilities 


HARNESSING ARTIFICIAL INTELLIGENCE FOR RANSOMWARE MITIGATION

February 7, 2024 Feb 7 | Jim McGann 0

AI and Machine Learning in Security AI and ML in Security Analytics &
Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data
Privacy Data Security Deep Fake and Other Social Engineering Tactics Digital
Transformation Editorial Calendar Endpoint Featured Governance, Risk &
Compliance Humor Identity & Access Identity and Access Management Incident
Response Industry Spotlight Insider Threats Malware Most Read This Week Network
Security News Popular Post Regulatory Compliance Securing the Cloud Securing the
Edge Security at the Edge Security Awareness Security Boulevard
(Original) Security Challenges and Opportunities of Remote Work Social -
Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat
Intelligence Threats & Breaches Zero-Trust 


CFO DEEPFAKE FOOLS STAFF — FAKERS STEAL $26M VIA VIDEO

February 5, 2024 Feb 5 | Richi Jennings 0
Analytics & Intelligence Cybersecurity Featured Incident
Response Malware Network Security News Security Boulevard (Original) Social -
X Spotlight Threat Intelligence 


SECUREWORKS APPLIES MULTIPLE FORMS OF AI TO ASSESS THREAT RISKS

February 5, 2024 Feb 5 | Michael Vizard 0
More Incident Response


IOT & ICS SECURITY

IoT & ICS Security Security Bloggers Network 


WHY IS IOT SECURITY IMPORTANT?

February 6, 2024 Feb 6 | MicroHackers 0

IoT & ICS Security Security Bloggers Network 


UNDERSTANDING THE CONNECTION BETWEEN IOT VULNERABILITIES AND HOME NETWORK
INTRUSIONS

February 2, 2024 Feb 2 | daniel.floyd@blackcloak.io 0
Analytics & Intelligence API Security AppSec Cloud Security Cloud
Security Cyberlaw Cybersecurity Data Privacy Deep Fake and Other Social
Engineering Tactics DevOps DevSecOps Editorial
Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity &
Access Identity and Access Management Incident Response Industry
Spotlight IOT IoT & ICS Security Most Read This Week Network
Security News Popular Post Regulatory Compliance Securing the Cloud Securing the
Edge Security at the Edge Security Awareness Security Boulevard
(Original) Security Challenges and Opportunities of Remote Work Security
Operations Social - Facebook Social - LinkedIn Social - X Social
Engineering Software Supply Chain Security Spotlight Threat Intelligence Threats
& Breaches Vulnerabilities Zero-Trust 


FBI WARNING: CHINA WILL HACK US INFRA. (VIA ROUTER BOTNET)

February 1, 2024 Feb 1 | Richi Jennings 0
More IoT & ICS Security


THREATS AND BREACHES

Security Bloggers Network Vulnerabilities 


ON SOFTWARE LIABILITIES

February 8, 2024 Feb 8 | Bruce Schneier 0

Careers Security Bloggers Network Threats & Breaches 


CYBERSECURITY HR FOR BUSINESS SUSTAINABILITY

February 7, 2024 Feb 7 | Nik Hewitt 0
Security Bloggers Network Vulnerabilities 


NEW GLIBC FLAW ALLOWS FULL ROOT ACCESS ON MAJOR LINUX DISTROS

February 7, 2024 Feb 7 | Shak Hossain 0
More Threats and Breaches


INDUSTRY SPOTLIGHT

Application Security Cloud Security Cloud Security Cybersecurity Data
Privacy Data Security Deep Fake and Other Social Engineering
Tactics DevOps DevSecOps Editorial Calendar Endpoint Featured Governance, Risk &
Compliance Humor Identity & Access Identity and Access Management Incident
Response Industry Spotlight Insider Threats IOT IoT & ICS
Security Malware Mobile Security Most Read This Week Network
Security News Popular Post Ransomware Securing Open Source Securing the
Cloud Securing the Edge Security at the Edge Security Awareness Security
Boulevard (Original) Security Challenges and Opportunities of Remote
Work Security Operations Social - Facebook Social - LinkedIn Social - X Social
Engineering Software Supply Chain Security Spotlight Threats &
Breaches Vulnerabilities Zero-Trust 


LINUX VENDORS SQUAWK: PATCH NOW — CVSS 9.8 BOOTKIT BUG IN SHIM.EFI

February 8, 2024 Feb 8 | Richi Jennings 0

Snow joke: A Microsoft researcher found it—and it’s somehow Microsoft’s fault.

Analytics & Intelligence Application Security Cybersecurity Data Privacy Data
Security Governance, Risk & Compliance Incident Response Industry
Spotlight Mobile Security Security Boulevard (Original) Social - X Social
Engineering Threat Intelligence Threats & Breaches Vulnerabilities 


HOW TO ENRICH DATA FOR FRAUD REDUCTION, RISK MANAGEMENT AND MITIGATION IN BFSI

February 8, 2024 Feb 8 | Anthony Deighton 0
Cloud Security Cybersecurity Data Security Featured Industry
Spotlight Malware Mobile Security Network Security News Security Boulevard
(Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat
Intelligence Threats & Breaches 


RANSOMWARE PAYMENTS IN 2023 HIT $1 BILLION: CHAINALYSIS

February 8, 2024 Feb 8 | Jeffrey Burt 0
Cloud Security Cybersecurity Data Security DevOps Featured Industry
Spotlight Mobile Security Network Security News Security Boulevard
(Original) Social - Facebook Social - LinkedIn Social -
X Spotlight Vulnerabilities 


GOOGLE PUSHES SOFTWARE SECURITY VIA RUST, AI-BASED FUZZING

February 7, 2024 Feb 7 | Jeffrey Burt 0
API Security Application Security Cloud Security Cloud
Security Cyberlaw Cybersecurity Data Privacy Deep Fake and Other Social
Engineering Tactics Editorial Calendar Endpoint Featured Governance, Risk &
Compliance Humor Identity & Access Incident Response Industry Spotlight IOT IoT
& ICS Security Malware Mobile Security Most Read This Week Network
Security News Popular Post Ransomware Securing Open Source Securing the
Cloud Securing the Edge Security at the Edge Security Awareness Security
Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social
Engineering Software Supply Chain Security Spotlight Threats &
Breaches Vulnerabilities Zero-Trust 


‘TOTAL BOLLOCKS’ — NO, YOUR TOOTHBRUSH ISN’T DDOS’ING

February 7, 2024 Feb 7 | Richi Jennings 0


UPCOMING WEBINARS

RISK AND THREAT MANAGEMENT STRATEGIES IN AN EVOLVING DIGITAL WORLD

February 20, 2024, 3 PM EST
As organizations increasingly operate within complex multi-cloud or hybrid
environments and embrace cloud-native software architectures, cybersecurity
teams’ role becomes more crucial  – and more challenging. Risks grow as attack
surfaces expand, cloud ... Read More

WHAT THE LATEST UPDATES TO CYBERSECURITY REGULATIONS MEAN FOR YOU

February 27, 2024, 1 PM EST
In 2023, there were a number of new cybersecurity regulations introduced in the
U.S. and the EU designed to protect organizations’ digital assets. But it can be
tricky to make sense of ... Read More
Click here for Industry spotlight inclusion guidelines
The Industry Spotlight Section of Security Boulevard is the place where tools
and service providers in the security field contribute to the community
discussion with original content. While there are vendor blogs in the Security
Bloggers Network, original content from these vendors are featured here. The
articles here must meet several criteria to be published:
 * * Must be original when published
 * * Must be vendor neutral
 * * Must be transparent as to authorship
 * * Must be of value to the community

Articles in the spotlight are authored by vendors. Some are even sponsored. If
you want to take the information with a grain of salt, that is entirely up to
you. When you think about it, who knows the use cases, product capabilities and
markets better than vendors? If you would like to submit an article to this
section, please write to editor@securityboulevard.com.



TECHSTRONG TV – LIVE

Click full-screen to enable volume control
Watch latest episodes and shows


UPCOMING WEBINARS

 1. 
 2. 
 3. 
 4. 
 5. 




PRESS RELEASES

AEMBIT ANNOUNCES NEW WORKLOAD IAM INTEGRATION WITH CROWDSTRIKE TO HELP
ENTERPRISES SECURE WORKLOAD-TO-WORKLOAD ACCESS

CONTROL D LAUNCHES CONTROL D FOR ORGANIZATIONS: DEMOCRATIZING CYBERSECURITY FOR
ORGANIZATIONS OF ALL SIZES

DELOITTE PARTNERS WITH MEMCYCO TO COMBAT ATO AND OTHER ONLINE ATTACKS WITH
REAL-TIME DIGITAL IMPERSONATION PROTECTION SOLUTIONS


SUBSCRIBE TO OUR NEWSLETTERS

Get breaking news, free eBooks and upcoming events delivered to your inbox.


View Security Boulevard Privacy Policy

--------------------------------------------------------------------------------





SECURITY BLOGGERS NETWORK - LATEST

6 hours ago | Impart Security Blog

BRINGING COMPOSABILITY TO FIREWALLS WITH RUNTIME PROTECTION RULES | IMPART
SECURITY

7 hours ago | Aurélien Poscia

NEW WEB API V2

8 hours ago | Jeffrey Burt

CHINA-SPONSORED HACKERS LIE IN WAIT TO ATTACK US INFRASTRUCTURE

8 hours ago | Anatole Otman

THE ART OF BOT DETECTION: HOW DATADOME USES PICASSO FOR DEVICE CLASS
FINGERPRINTING

9 hours ago | Richi Jennings

LINUX VENDORS SQUAWK: PATCH NOW — CVSS 9.8 BOOTKIT BUG IN SHIM.EFI


MOST READ ON THE BOULEVARD

US Uses Visa Restrictions in Struggle Against Spyware
CFO Deepfake Fools Staff — Fakers Steal $26M via Video
Secureworks Applies Multiple Forms of AI to Assess Threat Risks
‘Total Bollocks’ — No, Your Toothbrush isn’t DDoS’ing
Top Trends in Cybersecurity, Ransomware and AI in 2024
2022 End of Year Roundup
The Cloudflare source code breach: Lessons learned
How to comply with GDPR requirements
OWASP Top 10 for LLM Applications and Mitigation
Migrate Off That Old SIEM Already!


TOP STORIES

Featured News Security Boulevard (Original) Social - X Spotlight 


REPORT DETAILS SCOPE OF GLOBAL THREAT TO ELECTIONS

February 8, 2024 Michael Vizard | Yesterday 0
Cloud Security Cybersecurity Data Security Endpoint Featured Identity &
Access Mobile Security News Security Boulevard (Original) Social -
Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat
Intelligence 


IBM SHOWS HOW GENERATIVE AI TOOLS CAN HIJACK LIVE CALLS

February 7, 2024 Jeffrey Burt | 1 day ago 0
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data
Security Featured News Security Boulevard (Original) Social - X Spotlight Threat
Intelligence Threats & Breaches Vulnerabilities 


REPORT SURFACES EXTENT OF SAAS APPLICATION INSECURITY

February 6, 2024 Michael Vizard | 2 days ago 0


SECURITY HUMOR

LINUX VENDORS SQUAWK: PATCH NOW — CVSS 9.8 BOOTKIT BUG IN SHIM.EFI





JOIN THE COMMUNITY

 * Add your blog to Security Bloggers Network
 * Write for Security Boulevard
 * Bloggers Meetup and Awards
 * Ask a Question
 * Email: info@securityboulevard.com


USEFUL LINKS

 * About
 * Media Kit
 * Sponsor Info
 * Copyright
 * TOS
 * DMCA Compliance Statement
 * Privacy Policy


RELATED SITES

 * Techstrong Group
 * Cloud Native Now
 * DevOps.com
 * Digital CxO
 * Techstrong Research
 * Techstrong TV
 * Techstrong.tv Podcast
 * DevOps Chat
 * DevOps Dozen
 * DevOps TV

 * 
 * 
 * 
 * 
 * 
 * 
 * 


Copyright © 2024 Techstrong Group Inc. All rights reserved.








previousnextslideshow





We'd like to show you notifications for the latest news and updates.


AllowCancel