Selective Domain Filtering with Postfix and a SPAM Filtering Service

Selective Domain Filtering with Postfix and a SPAM Filtering Service

Yes, that title was a mouthful, but I’m trying to make sure I’m descriptive enough for the next guy who is in this situation. I was facing something interesting lately. There is ...
Pending tasks for an incident in Smart SOAR

What Enterprise Security Teams Expect from Case Management Solutions

A less-talked about challenge in cybersecurity is managing multiple alert queues. While the volume of alerts is acknowledged as an issue, an important step toward simplifying day-to-day life for security analysts is ...
organization, zero-trust, trust supply chain third-party

Zero-Trust: 5 Steps to Transition From Hype to Reality

The paradigm shift toward zero-trust has been years in the making for some organizations, while others still regard it as an aspiration. Although many organizations have touted their success in implementing the ...
Security Boulevard
Workflow to calculate Time to Respond in Smart SOAR

How Enterprises Use Smart SOAR to Track MSSP SLAs

Large enterprises often outsource some of their security needs to Managed Security Service Providers (MSSPs). When alert volumes are high, this is a simple way to onboard trained security professionals and stay ...
How to make your phishing campaign a success

How to make your phishing campaign a success

Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading ...
cybersecurity

Cloud Attack Surface Expands, Putting Pressure on Enterprise Security

Organizations are overwhelmed with devices and applications in their environment due to lack of management and control, and this expansion of the cloud-based attack surface threatens to overwhelm enterprise IT security. Findings ...
Security Boulevard
Cybersecurity Budgets in FY 2023-24

Smart Strategies for Streamlining Your Cybersecurity Budgets in FY 2023-24

Cybersecurity is an essential aspect of any organization’s operations, and neglecting it can result in significant consequences such as data breaches, financial loss, and damage to the reputation of your organization. Protecting ...
identity governance security Spera deepfake identity management

Spera Unveils Platform for Finding and Tracking Identities

Spera emerged from stealth today to launch a namesake platform that discovers and tracks identities to enable organizations to better enforce zero-trust cybersecurity policies. Fresh from raising $10 million in funding, Spera ...
Security Boulevard
Incident Response Vs. Disaster Recovery: What’s The Difference and Which Do You Need?

Incident Response Vs. Disaster Recovery: What’s The Difference and Which Do You Need?

When a business has a disaster, its recovery falls into two categories: incident response and disaster recovery. This blog offers an overview of the most important aspects of each, as well as ...
NIST Cybersecurity Framework

Leveraging the NIST Cybersecurity Framework For Business

The NIST cybersecurity framework is a powerful tool to organize and improve your cybersecurity program. Today many businesses see cybersecurity with a kind of laissez-faire attitude where they purchase few tools and assign ...