Data Security
How Digital Forensics Can Investigate the Dark Web
If your personal information is stolen in a data breach, it can find its way to the dark web to be sold, traded and exploited ...
Security Boulevard
Cybersecurity Spending Slows as Investment Patterns Shift
There was a 65% drop in growth in cybersecurity spending during the 2022-23 budget cycle, according to an IANS report ...
Security Boulevard
DigiCert Survey Reveals Post-Quantum Cybersecurity Challenges
Michael Vizard | | Data Security, DigiCert, encryption, post-quantum computing, PQC, quantum computing
A DigiCert survey found most organizations unprepared to address the security implications of post-quantum computing (PQC) ...
Security Boulevard
Empowering Your Security: Exploring the Advantages of Time-Based One-Time Passwords (TOTP)
From thwarting replay attacks to seamless integration across devices, TOTP ensures robust protection while providing a user-friendly experience. Embrace TOTP as more than a choice—it's a strategic investment in your digital security, ...
Cybersecurity Awareness Month: The Dark Side of Centralized Personal Identification Data
Guest Blogger: Branden Williams | VP, IAM Strategy | Ping Identity This Cybersecurity Awareness Month, join GuidePoint Security for A […] ...
Box Allies With CrowdStrike to Better Secure Files
A Box, Inc. and CrowdStrike alliance will make tools available to secure files and data shared via Box's cloud service ...
Security Boulevard
Survey Sees Cyberattacks Impacting Primary Health Care Services
A Proofpoint survey found the majority of health care organizations experienced an average of 40 attacks in the past 12 months ...
Security Boulevard
Data sprawl: why application access controls as a security strategy doesn’t work
Laura Case, Director of Product Management | | Data encryption, Data Security, privacy regulations, sensitive data
As enterprises maintain more and more data, there is a greater need to ensure that sensitive data is protected. Privacy regulations are increasing which is fantastic for individuals who want to keep ...
How to Protect Against Data Lake Hacking
Data lakes, or centralized repositories for large-scale data, are a popular solution for data storage, and there are good reasons for that. Data lakes are flexible and cost-effective, as they allow many ...
AI More Helpful Than Harmful in Cybersecurity
The majority of of IT security managers see the use of AI in security tools as helpful rather than a threat they must defend against ...
Security Boulevard