Ten Lessons Learned from The Mother of All Breaches Data Leak

What a year after the Mother of All Breaches data leak has taught us on cybersecurity, data protection, and more. It’s almost been a year since the “Mother of All Breaches” (MOAB), ...
How to Build Relationships With Developers?

Webinar recap: How to build relationships with developers?

Join our guest expert, Dustin Lehr, to learn how to earn developers' respect, introduce gamification, and get issues fixed in a security context ...
Security Training Will Not Save You From Phishing Attacks

Think Security Training Will Save You From Phishing Attacks? Think Again!

What’s Required: Intercept phishing attempts before they reach the intended targets In the vast and intricate web of cybersecurity threats, phishing attacks stand out for their deceptively simple yet alarmingly effective tactics ...

New Phishing Campaign Delivers Remote Access Trojans (RATs)

Sophisticated phishing campaign leverages public services, where remote access Trojans are being delivered via malicious Java downloader A new phishing campaign has surfaced this week which cleverly employs a Java-based downloader to ...
Security experience: top-down vs bottom-up⎥Jeevan Singh (Rippling, Twilio)

Building security training for developers in 2024: Is it really worth it and how to proceed?

Discover the value of developer security training in 2024 and effective strategies for fostering a secure software development culture ...
Developers and security training:  can they co-exist?⎜Laura Bell Main

Developers and security training: can they co-exist?⎜Laura Bell Main

Today, we’re excited to have an amazing guest, Laura Bell Main, join us. Discover with us: Can developers and security training really co-exist? ...

Cybersecurity HR for Business Sustainability

Strengthening organizational defenses from within with cybersecurity HR We work in a rapidly evolving workplace, and cybersecurity is not just a technical challenge but a holistic organizational effort. The Human Resources (HR) ...
Security training: Necessary investment or overrated expense?⎥Mel Reyes

Security training: Necessary investment or overrated expense?⎥Mel Reyes (Global CEO, CIO, CISO, & CTO with 30 years of experience)

Explore whether security training is a necessary investment or an expense, how to effectively measure the ROI & how to strike the right balance ...
gamification, gamified, training, Fortinet Mimecast training

Gamification for Enhanced Security Awareness and Compliance Training

The gamified approach to compliance training facilitates better understanding and cultivates a culture of compliance within the organization ...
Security Boulevard
SMBs, IT and security, hackers, threats, shutdown SMBs cybercriminals business ransomware malware Kaseya 6 Ways Poor Cybersecurity Hurts Businesses

Why Cybersecurity Needs To Be an SMB Priority

SMBs are low-hanging fruit for cybercriminals because they have limited IT resources, staff and cybersecurity defenses ...
Security Boulevard