Sunday, December 1, 2024

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

governance

GRC, strategies, best practices, risk management,

4 Tips for Optimizing Your GRC Strategy

Alev Viggio | August 31, 2024 | Compliance, governance, risk
Why GRC strategies are often not as effective as they could be, and specific practices businesses can adopt to improve GRC operations ...
Security Boulevard

Toil Not: Automate DevOps Governance

Deb Radcliff | August 2, 2024 | attestation, CrowdStrike, DEVOPS, DevSecOps, governance, safety, SAST, SBOM, security, SolarWinds, TalkSecure Blog
By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndicated at Security Boulevard & YouTube) In this show, Deb interviews two innovative technologists driving the DevOps Automated Governance movement ...
CodeSecure
Sigstore for Python Packaging: Next Steps for Adoption - William Woodruff, Trail of Bits

Securing Artifacts: Keyless Signing with Sigstore and CI/MON

Alex Ilgayev | August 1, 2024 | Blog, code tampering, governance, Hardening SDLC, research, software supply chain security
Artifact integrity is crucial in maintaining software security and trustworthiness. High-profile breaches like SolarWinds, CodeCov, 3CX, and JumpCloud have shown how altering artifact contents can lead to significant security vulnerabilities, enabling attackers ...
Cycode
GenAI, artificial intelligence, cyber risks, threats, cybersecurity

Risks of GenAI Rising as Employees Remain Divided About its Use in the Workplace

Sonya Duffin | May 16, 2024 | ai ethics, Artificial Intelligence, Data Privacy, data resilience, GenAI, governance, training
One in three office workers who use GenAI admit to sharing customer info, employee details and financial data with the platforms. Are you worried yet? ...
Security Boulevard
falling off cliff

Critical Start Launches Cyber Risk Register

Nathan Eddy | May 6, 2024 | Compliance, critical risk, Cyber risk register, governance, recordkeeping, risk management, tracking system, workflow
The centralized system helps organizations identify, track, and reduce risks, addressing the challenges of incomplete risk visibility and manual processes ...
Security Boulevard
An Introduction to FinOps Governance: How to Get Started

An Introduction to FinOps Governance: How to Get Started

Joe Pelletier | April 30, 2024 | governance
FinOps, a portmanteau of Finance and DevOps, is a strategic framework created to help companies understand and manage their cloud costs, enabling greater efficiency in cloud service usage. Created by the FinOps ...
Fairwinds | Blog
IBM quantum generative AI security, management, organizations, GDPR, Strike Force privacy, vendors, RFPs, cloud, data security DLP Iran DUMPS Conti Hackers Sandbox government HackerOne IBM data security

Cybersecurity a Top Priority for Audit Committees

Nathan Eddy | March 26, 2024 | Audit, Compliance, Cybersecurity, Deloitte, governance, risk
Audit committees consider cybersecurity their primary oversight focus as the SEC enforces tougher cyberattack disclosure regulations ...
Security Boulevard
digital identity, organizations, IGA driver's license identity verification

Identity Governance Has a Permission Problem

Deepak Taneja | February 15, 2024 | access, governance, iam, identity, Machine Identity, Permissions
Identity's role as the new security perimeter in the cloud is driving a new set of governance requirements and making permissions tricky ...
Security Boulevard
Cloudflare Akamai software, engineering, OWASP, organizations, appsec, AppSec Salt Security API security rise GitOps Finite State API APIs tokenization

Salt Security Adds Governance Engine to API Security Platform

Michael Vizard | January 17, 2024 | api, API security, Application Security, Compliance, governance, risk, Salt Security
Salt Security added a posture governance engine to its API security platform that defines and enforces implementation standards ...
Security Boulevard
DEF CON 31

DEF CON 31 – Secretary of US Homeland Security Alejandro Mayorkas

Marc Handelman | December 19, 2023 | Cybersecurity, DEF Con 31, DEFCONConference, governance, Information Security, national security, Security Conferences, USCG, USDHS
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
Infosecurity.US
Load more Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Mobility Field Day

Upcoming Webinars

Hacker Tactic: Avoid Blind Spots with Your Windows Event Logs
Simplifying Network Access: Secure Modern Connectivity with Tailscale
Staying Ahead: Top Internet Trends Shaping Networking and Security
DevSecOps “Friends”, Webinar Series: The One with Platform Engineering (and the Happy Developers)
Managing Dependencies at Enterprise Scale

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’
Protecting Web-Based Work: Connecting People, Web Browsers and Security
Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform

Industry Spotlight

QNAP’s Buggy Security Fix Causes Chaos
Application Security Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight IoT & ICS Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

QNAP’s Buggy Security Fix Causes Chaos

November 26, 2024 Richi Jennings | Nov 26 0
U.S. Agencies Seize Four North Korean IT Worker Scam Websites
Cloud Security Cybersecurity Data Security DevOps Endpoint Featured Identity & Access Industry Spotlight Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

U.S. Agencies Seize Four North Korean IT Worker Scam Websites

November 22, 2024 Jeffrey Burt | Nov 22 0
Here’s Yet Another D-Link RCE That Won’t be Fixed
Application Security Cyberlaw Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight IoT & ICS Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

Here’s Yet Another D-Link RCE That Won’t be Fixed

November 21, 2024 Richi Jennings | Nov 21 0

Top Stories

Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’
Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Interpol, African Nations Arrest 1,006 in Sweeping ‘Operation Serengeti’

November 27, 2024 Jeffrey Burt | 4 days ago 0
Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform
Application Security Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X 

Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform

November 27, 2024 Michael Vizard | 4 days ago 0
Supply Chain Ransomware Attack Hits Starbucks, UK Grocers
Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches 

Supply Chain Ransomware Attack Hits Starbucks, UK Grocers

November 26, 2024 Jeffrey Burt | Nov 26 0

Download Free eBook

The State of Cloud Native Security 2020

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2024 Techstrong Group Inc. All rights reserved.
×