Reading view

There are new articles available, click to refresh the page.

Enhancing Enterprise Browser Security

TechSpective Podcast Episode 133   Nick Edwards, Vice President of Product Management at Menlo Security joins me for this insightful episode of the TechSpective Podcast. Nick brings decades of cybersecurity experience to the table, offering a deep dive into the […]

The post Enhancing Enterprise Browser Security appeared first on TechSpective.

The post Enhancing Enterprise Browser Security appeared first on Security Boulevard.

💾

A New Tactic in the Rapid Evolution of QR Code Scams

QR code phishing

QR codes have been around for three decades, but it wasn’t until the COVID-19 pandemic hit in 2020 that they got wide use, with restaurants, health care facilities, and other businesses turning to them to customers contactless ways to read menus, buy items, or track the health of people in their buildings. Around the same..

The post A New Tactic in the Rapid Evolution of QR Code Scams appeared first on Security Boulevard.

AI-Powered Transformation: Optimizing B2B SaaS for Efficiency and Growth (Without Sacrificing Your Team)

The fear of AI replacing human jobs in B2B SaaS is a myth. AI excels at automating repetitive tasks, allowing your team to focus on strategic initiatives.

The post AI-Powered Transformation: Optimizing B2B SaaS for Efficiency and Growth (Without Sacrificing Your Team) appeared first on Security Boulevard.

Ransomware Group Jumps on PHP Vulnerability

PHP ransomware vulnerability

A long-running ransomware campaign that has been targeting Windows and Linux systems since 2019 is the latest example of how closely threat groups track public disclosures of vulnerabilities and proofs-of-concept (PoCs) and how quickly they move in to exploit them. The PHP Group last week disclosed a high-severity flaw – tracked as CVE-2024-4577 and with..

The post Ransomware Group Jumps on PHP Vulnerability appeared first on Security Boulevard.

Microsoft, Google Come to the Aid of Rural Hospitals

CSPM, ASPM, CISA cybersecurity healthcare

Microsoft and Google will provide free or low-cost cybersecurity tools and services to rural hospitals in the United States at a time when health care facilities are coming under increasing attack by ransomware gangs and other threat groups. For independent rural and critical access hospitals, Microsoft will provide grants and as much as 75% discounts..

The post Microsoft, Google Come to the Aid of Rural Hospitals appeared first on Security Boulevard.

The Policy Blocklist: what is it, and why should you be on it?

It’s not always "bad" to be listed on one of Spamhaus' DNS Blocklists. Despite what you may think, there is one list you may want to be on: the Policy Blocklist (PBL). Want to know more? Let's dive into the PBL, what it is, how it works, and how it affects users. Whether you're an Internet Service Provider (ISP) or an end user, find out everything you need to know.

The post The Policy Blocklist: what is it, and why should you be on it? appeared first on Security Boulevard.

Senator: HHS Needs to Require Security Measures for Health Sector

health care cybersecurity ransomware

U.S. Senator Ron Wyden, who late last month asked federal agencies to investigate flaws in UnitedHealth Group’s cybersecurity measures that led to the massive ransomware attack that disrupted hundreds of hospital and pharmacy operations, now is pushing the Health and Human Services (HHS) Department to require such large health care organizations to immediately implement protections...

The post Senator: HHS Needs to Require Security Measures for Health Sector appeared first on Security Boulevard.

Shining the Light on Shadow IT: Top Five SaaS Security Tips for Third-Party Risk Management

cybersecurity, SaaS, Palo Alto, third-party vendors, SaaS security, CISO, SSPM, SaaS security, SentinelLabs AppOmni Valence SaaS security Thirdera SaaS management SSPM CISOs SaaS

Security teams often grapple with the uncertainty of data exposure in their SaaS supply chain, especially with third-party SaaS vendors. A proactive approach helps safeguard organizations against SaaS threats. It begins with a comprehensive evaluation of third-party vendor cybersecurity practices to pinpoint potential vulnerabilities and risks within the supply chain.

The post Shining the Light on Shadow IT: Top Five SaaS Security Tips for Third-Party Risk Management appeared first on Security Boulevard.

❌