Blogs
Blog Computer Security

Covid-19 is Transforming Cybersecurity for Businesses

The on-going pandemic is a crucial enabler of initiating the digital transformation in cloud computing not just as an operating model but mainly as a technological shift. Many large and…

Blog Computer Security

Zoom Acquires Keybase to Add End-to-End Encryption

Could we have ever predicted that “Zoom-bombing” (similar to “photo-bombing” where a total stranger jumps in the middle of your frame as you take a selfie photo) would be a…

What We Are Reading
Article Computer Security

Authentic8 Silo Labeled High Performer on G2 - Security Boulevard

Silo for Research (Toolbox) recieved a High Performer badge for the Threat Intelligence Software category. Read what Authentic8 customers say about Silo.

Article Computer Security

Fake Outlook Credential Upgrade Campaign Phishes for Employee Credentials - Security Boulevard

Bad actors are using a message disguised as an official notification from the Outlook team to trick people into entering their credentials into a phishing website, leaking them in the process and exposing the company they work for. Phishing is one of the most common methods to obtain legitimate credentials, letting attackers compromise systems with

Article Computer Security

AppSecCali 2020 - Abhay Bhargav's 'Dr. DevSecOps: Or How I Stopped Worrying About CI And Started Loving The Cloud' - Security Boulevard

Many thanks to AppSec California 2020 for publishing their outstanding AppSecCali 2020 Conference Videos. Enjoy! Permalink

Article Computer Security

The Key Reason Why Some Enterprises Outright Refuse to Enable BYOD - Security Boulevard

Most IT professionals say employees are allowed to use personal devices for work. And while the use of personal devices at work is growing rapidly, many are unprepared to balance productivity with security, new data shows.

Article Computer Security

Is Your Malware Detection Future-Proof? 7 Adaptable Technologies for Elusive Threats - Security Boulevard

While the media have extensively covered the recent spike in malware, a certain aspect seems to have been downplayed. The truth is, not only have cyber-attacks grown significantly during the pandemic (in March alone, 832 million records were breached through malware), but their complexity has also visibly increased as well.

Article Computer Security

The Problem with Relying on Log Data for Cybersecurity - Security Boulevard

One of the most prevalent issues impacting the effectiveness of security teams who use SIEM as their primary means of threat detection and remediation is the fact that data logs are an attractive medium for modern hackers to exploit.