Google Cloud cyber, hygiene, building blocks

Cybersecurity Hygiene—Building Blocks to Protect Your Attack Surface

Cybersecurity breaches or ransomware-induced shutdowns can crush a company. Financial loss. Reputation damage. Legal penalties. Nobody wants to be responsible for any of these, but attacks are on the rise. The average ...
Security Boulevard
ransomware RaaS

Moving Beyond Security Culture Bottlenecks

Creating and maintaining an effective security culture is the holy grail for many, if not all, organizations in this era of security breaches and heightened privacy concerns among employees, customers and other ...
Security Boulevard
Tines Orca Security Cisco cybersecurity critical defense end-of-life-system cyberinsurers hygiene posture SASE How the Cybersecurity Industry Changed in 2020

Security Hygiene, Posture Management Remain Challenging

Posture management is still one of the least mature areas in security, even though 86% of organizations believe they follow best practices for security hygiene and posture management. These were among the ...
Security Boulevard
resolutions cybersecurity password

Marketing, Aerospace, and IT Pros Struggle with Passwords

What do marketing, aerospace and IT professionals have in common? At first glance, not much. But a closer look will show you that there is something that ties them together—passwords. Namely, the ...
Security Boulevard
cybersecurity behavior user security training Convince Employees to Care About Security Training

Successfully Influencing Employee Security Behavior

With phishing scams common and the risk of security breaches made more likely thanks to an expanding threat surface, security teams are debating how to deal with—and in some cases, punish—employees who ...
Security Boulevard
Akamai IoT devices cybersecurity internet of things IoT security

How To Tackle the 5 Biggest Enterprise IoT Security Challenges

The proliferation of IoT devices, particularly in the workplace, has left businesses with a new set of security challenges to deal with. For any company considering investing in IoT devices, it is ...
Security Boulevard

The OPSEC of Protesting

For the past three months thousands of people have been protesting in the United States due to the deaths of George Floyd, Breonna Taylor, Tony McDade, and others. Many of the protesters ...
certificate Menlo states cyber

How Cyber Secure Is Your State?

Even the most cyber secure states didn’t score above a C average, which means there’s more work to be done Security and IT managers all over the globe have had to scramble ...
Security Boulevard

[Infographic] macOS Native Security Configurations and osquery

Be it for macOS or my dog eating out of the trash, there is no such thing as a bullet-proof security policy. It’s all about creating a threshold of standards- something to ...

Real-Time Observations in Security Hygiene

The most recent breach is notable in that several missteps occurred. These missteps are good reminders of the importance of security hygiene in a hyperconnected world. Take a moment to review and ...