Understanding the NYDFS Cybersecurity Regulation

Understanding the NYDFS Cybersecurity Regulation

Whether you're a small financial service provider or a major institution, if you’re doing business in the state of New York, you need to meet New York Department of Financial Services (NYDFS) ...
CMMC Compliance Requirements: A Complete Guide

CMMC Compliance Requirements: A Complete Guide

Department of Defense (DoD) data is some of the most sensitive out there. That’s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures ...
What Is CI/CD Security? Risks and Best Practices

What Is CI/CD Security? Risks and Best Practices

Continuous integration and continuous delivery (CI/CD) pipelines are invaluable in software development. They expedite the deployment process and maintain teams at the forefront of innovation. But with these benefits come unique security ...
7 Best AI Cybersecurity Tools for Your Company

7 Best AI Cybersecurity Tools for Your Company

With advanced AI cybersecurity tools, you bring powerful capabilities to your security strategy. AI enhances threat detection, automates key security tasks, and strengthens your overall security posture, completing tasks with speed and ...
sextortion, dark web, attacks, threats, darktrace energy dark web intelligence Dark Side Quantum Computing

Barracuda Networks Report Sees Sextortion Becoming More Personalized

| | AI, deepfake, sextortion, threats
A report published by Barracuda Networks warns that sextortion attacks are getting even more personal and payment demands have increased ...
Security Boulevard
Leveraging Tabletop exercises to Enhance OT security maturity

Leveraging Tabletop exercises to Enhance OT security maturity

| | CISO, Incident Response, iot, OT, threats
Has your organization tested its OT security incident response plan in the last 6 months? Do you remember when you last checked your institutional OT security awareness levels? Are your OT security ...
attacks, cyberthreats, cyber training, AI cybersecurity executive order national security

How Cybersecurity Training Must Adapt to a New Era of Threats

We have entered a new era of cyberthreats, and employees must be equipped to defend the company from more cunning and effective attacks than ever ...
Security Boulevard
SLSA Framework: What is It and How to Gain Visibility

SLSA Framework: What is It and How to Gain Visibility

| | AppSec, threats
In Part 2 of this blog series, we uncover the details of SLSA provenance from end to end. Previously in Part 1, we started by reviewing in-toto attestations, which are the underlying ...
PCI DSS Self-Assessment Questionnaires: Choosing the Right Type

PCI DSS Self-Assessment Questionnaires: Choosing the Right Type

If you process credit card payments, you need to prioritize security. One way to guarantee this safety is by complying with Payment Card Industry (PCI) Data Security Standards (DSS) ...
How to evaluate OT security program maturity

How to evaluate OT security program maturity

| | CISO, Incident Response, iot, OT, threats
An OT security program can lead to better resource use, improved security operations, and tangible gains for the security posture of an OT operator. The benefits of running an OT security program ...