{"id":1762771,"date":"2018-03-01T10:38:03","date_gmt":"2018-03-01T15:38:03","guid":{"rendered":"https:\/\/securityboulevard.com?page_id=1762771&#038;preview_id=1762771"},"modified":"2018-05-05T09:19:59","modified_gmt":"2018-05-05T13:19:59","slug":"industry-spotlight","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/industry-spotlight\/","title":{"rendered":"Industry Spotlight"},"content":{"rendered":"<div id=\"pl-1762771\"  class=\"panel-layout\" ><div id=\"pg-1762771-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1762771-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1762771-0-0-0\" class=\"widget_text so-panel widget_custom_html panel-first-child\" data-index=\"0\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"50a015dvmy\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037597\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Three tiny people cleaning the inside of a hard drive\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037360\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Hackathons-Cybersecurity-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"North Korea IT worker scam\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self cvplbd\" target=\"_self\" >U.S. Agencies Seize Four North Korean IT Worker Scam Websites<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T09:54:07-05:00\">1 week ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037237\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw.png\" class=\"pt-cv-thumbnail img-none\" alt=\"A D-Link DSR-250N, which is now EOL\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Here\u2019s Yet Another D-Link RCE That Won\u2019t be Fixed<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T12:33:40-05:00\">1 week ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#50a015dvmy\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#50a015dvmy\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-4cbea0bi59\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1762771-0-0-1\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-65bf617vqx\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037060\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"David \u201cdwizzzle\u201d Weston\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Microsoft Veeps Ignite Fire Under CrowdStrike<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Richi Jennings<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T12:03:14-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike\/' title='CrowdStrike' class='pt-cv-tax-crowdstrike'>CrowdStrike<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-falcon\/' title='CrowdStrike Falcon' class='pt-cv-tax-crowdstrike-falcon'>CrowdStrike Falcon<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-incident\/' title='CrowdStrike incident;' class='pt-cv-tax-crowdstrike-incident'>CrowdStrike incident;<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-updates\/' title='crowdstrike updates' class='pt-cv-tax-crowdstrike-updates'>crowdstrike updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/david-weston\/' title='David Weston' class='pt-cv-tax-david-weston'>David Weston<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ignite\/' title='ignite' class='pt-cv-tax-ignite'>ignite<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft\/' title='Microsoft' class='pt-cv-tax-microsoft'>Microsoft<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-security\/' title='Microsoft security' class='pt-cv-tax-microsoft-security'>Microsoft security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-virus-initiative\/' title='Microsoft Virus Initiative' class='pt-cv-tax-microsoft-virus-initiative'>Microsoft Virus Initiative<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-windows\/' title='Microsoft Windows' class='pt-cv-tax-microsoft-windows'>Microsoft Windows<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/quick-machine-recovery\/' title='Quick Machine Recovery' class='pt-cv-tax-quick-machine-recovery'>Quick Machine Recovery<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/rust\/' title='rust' class='pt-cv-tax-rust'>rust<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/safe-deployment-practices\/' title='Safe Deployment Practices' class='pt-cv-tax-safe-deployment-practices'>Safe Deployment Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/windows\/' title='Windows' class='pt-cv-tax-windows'>Windows<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/windows-security\/' title='Windows security' class='pt-cv-tax-windows-security'>Windows security<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037038\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"PCI DSS, third-party, businessmman with a credit card and computer\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/credit-card-rupixen-Q59HmzK38eQ-unsplash-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self cvplbd\" target=\"_self\" >Black Friday Scammers are Hard at Work: Security Experts<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T09:00:12-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/black-friday\/' title='black friday' class='pt-cv-tax-black-friday'>black friday<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/impersonation-attacks\/' title='Impersonation attacks' class='pt-cv-tax-impersonation-attacks'>Impersonation attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-shopping-scams\/' title='online shopping scams' class='pt-cv-tax-online-shopping-scams'>online shopping scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Scammers are using everything from fraudulent deals and fake ads to spoofed websites and brand impersonation to target online shoppers who are gearing up for Black Friday as the holiday buying season gets underway, according to cybersecurity firms ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036973\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/epa-ig-office-high-risk-security-flaws-in-hundreds-of-water-systems\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"water system cyberthreats EPA OIG\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2021\/02\/oldsmar-greis-v-pixabay-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/epa-ig-office-high-risk-security-flaws-in-hundreds-of-water-systems\/\" class=\"_self cvplbd\" target=\"_self\" >EPA IG Office: \u2018High-Risk\u2019 Security Flaws in Hundreds of Water Systems<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T16:15:39-05:00\">November 19, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cyber-attack-on-critical-infrastructure\/' title='cyber attack on critical infrastructure' class='pt-cv-tax-cyber-attack-on-critical-infrastructure'>cyber attack on critical infrastructure<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/epa\/' title='EPA' class='pt-cv-tax-epa'>EPA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/public-water-systems\/' title='public water systems' class='pt-cv-tax-public-water-systems'>public water systems<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/vulnerabilities\/' title='Vulnerabilities' class='pt-cv-tax-vulnerabilities'>Vulnerabilities<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The watchdog for the EPA found that, of 1,062 U.S. drinking water systems it assessed, 97 had \"critical\" or \"high-risk\" security flaws and another 211 had less dangerous vulnerabilities, risking threats from stolen data to disrupted service ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/epa-ig-office-high-risk-security-flaws-in-hundreds-of-water-systems\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036204\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-nas-wont-fix-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"xkcd.com\/327 \u2014 \u201cExploits of a Mom\u201d\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/sanitize-inputs-richixbw-xkcd-cc-by-nc-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-nas-wont-fix-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >These 20 D-Link Devices Have Critical RCE Bug \u2014 but NO Patch NEVER<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Richi Jennings<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-13T12:22:08-05:00\">November 13, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cve-2024-10914\/' title='CVE-2024-10914' class='pt-cv-tax-cve-2024-10914'>CVE-2024-10914<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link\/' title='D-Link' class='pt-cv-tax-d-link'>D-Link<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-corporation\/' title='D-Link Corporation' class='pt-cv-tax-d-link-corporation'>D-Link Corporation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-nas-devices\/' title='D-Link NAS Devices' class='pt-cv-tax-d-link-nas-devices'>D-Link NAS Devices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-vulnerability\/' title='D-Link vulnerability' class='pt-cv-tax-d-link-vulnerability'>D-Link vulnerability<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-zero-day\/' title='D-Link zero day' class='pt-cv-tax-d-link-zero-day'>D-Link zero day<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things\/' title='Internet of things' class='pt-cv-tax-internet-of-things'>Internet of things<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot\/' title='Internet of Things (IoT)' class='pt-cv-tax-internet-of-things-iot'>Internet of Things (IoT)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot-security\/' title='Internet of Things (IoT) Security' class='pt-cv-tax-internet-of-things-iot-security'>Internet of Things (IoT) Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-cyber-security\/' title='Internet of Things cyber security' class='pt-cv-tax-internet-of-things-cyber-security'>Internet of Things cyber security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/nas\/' title='NAS' class='pt-cv-tax-nas'>NAS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/network-storage-device\/' title='network storage device' class='pt-cv-tax-network-storage-device'>network storage device<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">\u2018Bobby\u2019 flaw flagged WONTFIX: Company doesn\u2019t make storage devices now; has zero interest in fixing this catastrophic vulnerability ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-nas-wont-fix-richixbw\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036079\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/insurance-firm-introduces-liability-coverage-for-cisos\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"SolarWinds Uber CISO liability protection\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Micron-Intellectual-Property-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/insurance-firm-introduces-liability-coverage-for-cisos\/\" class=\"_self cvplbd\" target=\"_self\" >Insurance Firm Introduces Liability Coverage for CISOs<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-12T08:50:59-05:00\">November 12, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ciso-job\/' title='CISO job' class='pt-cv-tax-ciso-job'>CISO job<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-liability-insurance\/' title='cyber liability insurance' class='pt-cv-tax-cyber-liability-insurance'>cyber liability insurance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/solarwinds\/' title='SolarWinds' class='pt-cv-tax-solarwinds'>SolarWinds<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/uber\/' title='Uber' class='pt-cv-tax-uber'>Uber<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">National insurance firm Crum and Forster is offering a professional liability program for CISOs who are facing growing regulatory pressures and sophisticate cyberattacks but often are not covered by their organizations' D&O policies ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/insurance-firm-introduces-liability-coverage-for-cisos\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2035664\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/schneider-electric-hellcat-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Baguettes\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/baguettes-richixbw-sergio-arze-nFOGUoiMXqc-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/schneider-electric-hellcat-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Schneider Electric Confirms Ransom Hack \u2014 Hellcat Demands French Bread as \u2018Joke\u2019<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Richi Jennings<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-06T12:29:24-05:00\">November 6, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/baguette\/' title='Baguette' class='pt-cv-tax-baguette'>Baguette<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/bgtt\/' title='BGTT' class='pt-cv-tax-bgtt'>BGTT<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crypto\/' title='Crypto' class='pt-cv-tax-crypto'>Crypto<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crypto-crime\/' title='crypto crime' class='pt-cv-tax-crypto-crime'>crypto crime<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crypto-currency\/' title='crypto currency' class='pt-cv-tax-crypto-currency'>crypto currency<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptocoin\/' title='cryptocoin' class='pt-cv-tax-cryptocoin'>cryptocoin<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptocrurrency\/' title='Cryptocrurrency' class='pt-cv-tax-cryptocrurrency'>Cryptocrurrency<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptocurrencies\/' title='cryptocurrencies' class='pt-cv-tax-cryptocurrencies'>cryptocurrencies<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptocurrency\/' title='cryptocurrency' class='pt-cv-tax-cryptocurrency'>cryptocurrency<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cryptocurrency-humor\/' title='Cryptocurrency Humor' class='pt-cv-tax-cryptocurrency-humor'>Cryptocurrency Humor<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/grep\/' title='grep' class='pt-cv-tax-grep'>grep<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/greppy\/' title='greppy' class='pt-cv-tax-greppy'>greppy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hellcat\/' title='Hellcat' class='pt-cv-tax-hellcat'>Hellcat<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ica\/' title='ICA' class='pt-cv-tax-ica'>ICA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/international-contract-agency\/' title='International Contract Agency' class='pt-cv-tax-international-contract-agency'>International Contract Agency<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">That\u2019s a lot of pain: $125,000 ransom seems small\u2014but why do the scrotes want it paid in baguettes? ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/schneider-electric-hellcat-richixbw\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034878\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canada-china-cccs-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Canadian \u201cmounties\u201d marching down the street\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/canada-richixbw-nic-amaya-W8EP1hOwO7E-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/canada-china-cccs-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >\u00d4! China Hacks Canada too, Says CCCS<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Richi Jennings<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-01T12:44:35-04:00\">November 1, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/canada\/' title='canada' class='pt-cv-tax-canada'>canada<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/canadian-centre-for-cyber-security\/' title='Canadian Centre for Cyber Security' class='pt-cv-tax-canadian-centre-for-cyber-security'>Canadian Centre for Cyber Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/canadian-government\/' title='Canadian Government' class='pt-cv-tax-canadian-government'>Canadian Government<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china\/' title='china' class='pt-cv-tax-china'>china<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-linked-hackers\/' title='China-linked Hackers' class='pt-cv-tax-china-linked-hackers'>China-linked Hackers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-nexus-cyber-attacks\/' title='China-nexus cyber attacks' class='pt-cv-tax-china-nexus-cyber-attacks'>China-nexus cyber attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/china-nexus-cyber-espionage\/' title='China-nexus cyber espionage' class='pt-cv-tax-china-nexus-cyber-espionage'>China-nexus cyber espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese\/' title='Chinese' class='pt-cv-tax-chinese'>Chinese<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-communists\/' title='Chinese Communists' class='pt-cv-tax-chinese-communists'>Chinese Communists<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-cyber-espionage\/' title='Chinese cyber espionage' class='pt-cv-tax-chinese-cyber-espionage'>Chinese cyber espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-government\/' title='chinese government' class='pt-cv-tax-chinese-government'>chinese government<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-hacker\/' title='chinese hacker' class='pt-cv-tax-chinese-hacker'>chinese hacker<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-hackers\/' title='Chinese hackers' class='pt-cv-tax-chinese-hackers'>Chinese hackers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-hacking-groups\/' title='Chinese Hacking Groups' class='pt-cv-tax-chinese-hacking-groups'>Chinese Hacking Groups<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-intelligence\/' title='Chinese Intelligence' class='pt-cv-tax-chinese-intelligence'>Chinese Intelligence<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/chinese-state-sponsored-cyberattacks\/' title='Chinese state-sponsored cyberattacks' class='pt-cv-tax-chinese-state-sponsored-cyberattacks'>Chinese state-sponsored cyberattacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/national-cyber-threat-assessment\/' title='National Cyber Threat Assessment' class='pt-cv-tax-national-cyber-threat-assessment'>National Cyber Threat Assessment<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/peoples-republic-of-china\/' title='Peoples Republic of China' class='pt-cv-tax-peoples-republic-of-china'>Peoples Republic of China<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Plus brillants exploits: Canadian Centre for Cyber Security fingers Chinese state sponsored hackers ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/canada-china-cccs-richixbw\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034795\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/unitedhealth-hires-longtime-cybersecurity-executive-as-ciso\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"UnitedHealth CISO\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/02\/CISO-Cybersecurity-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/unitedhealth-hires-longtime-cybersecurity-executive-as-ciso\/\" class=\"_self cvplbd\" target=\"_self\" >UnitedHealth Hires Longtime Cybersecurity Executive as CISO<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-31T16:19:38-04:00\">October 31, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/healthcare-data-breach\/' title='healthcare data breach' class='pt-cv-tax-healthcare-data-breach'>healthcare data breach<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/unitedhealth\/' title='UnitedHealth' class='pt-cv-tax-unitedhealth'>UnitedHealth<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">UnitedHealth Group, which is still picking up the pieces after a massive ransomware attack that affected more than 100 million people, hired a new and experienced CISO to replace the previous executive who became a target of lawmakers for having no cybersecurity background ... <a href=\"https:\/\/securityboulevard.com\/2024\/10\/unitedhealth-hires-longtime-cybersecurity-executive-as-ciso\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034738\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/small-businesses-boosting-cybersecurity-as-threats-grow-itrc\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"ITRC, cyberattack, small business, tactics, cyber AI, AI attacks, cybersecurity, defense, organization\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/05\/Small-Business-Cyberattacks-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/small-businesses-boosting-cybersecurity-as-threats-grow-itrc\/\" class=\"_self cvplbd\" target=\"_self\" >Small Businesses Boosting Cybersecurity as Threats Grow: ITRC<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-31T11:23:39-04:00\">October 31, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyberthreats\/' title='cyberthreats' class='pt-cv-tax-cyberthreats'>cyberthreats<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/itrc\/' title='ITRC' class='pt-cv-tax-itrc'>ITRC<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/small-business\/' title='small business' class='pt-cv-tax-small-business'>small business<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">A report by the Identity Theft Resource Center found that while the number of small businesses hit by a cyberattack and the amount of losses continues to grow, companies are adopting stronger security best practices and investing more in security and compliance tools ... <a href=\"https:\/\/securityboulevard.com\/2024\/10\/small-businesses-boosting-cybersecurity-as-threats-grow-itrc\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034656\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/cloud-security-alliance-advocates-zero-trust-for-critical-infrastructure\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"critical, infrastructure, threats, cybersecurity energy infrastructure CISA NSA\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/07\/Critical-Infrastructure-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/cloud-security-alliance-advocates-zero-trust-for-critical-infrastructure\/\" class=\"_self cvplbd\" target=\"_self\" >Cloud Security Alliance Advocates Zero Trust for Critical Infrastructure<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-30T16:34:47-04:00\">October 30, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cloud-security-alliance\/' title='cloud security alliance' class='pt-cv-tax-cloud-security-alliance'>cloud security alliance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/critical-infrastructure-attacks\/' title='critical infrastructure attacks' class='pt-cv-tax-critical-infrastructure-attacks'>critical infrastructure attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/operational-technology\/' title='operational technology' class='pt-cv-tax-operational-technology'>operational technology<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/zero-trust-cybersecurity\/' title='zero trust cybersecurity' class='pt-cv-tax-zero-trust-cybersecurity'>zero trust cybersecurity<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The Cloud Security Alliance, noting the increasing cyberthreats to critical infrastructure in a highly interconnected world, released a report outlining steps organizations can take to implement zero trust policies to protect against nation-state actors and other threat groups ... <a href=\"https:\/\/securityboulevard.com\/2024\/10\/cloud-security-alliance-advocates-zero-trust-for-critical-infrastructure\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1762771\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"123\" data-nextpages=\"2\" data-sid=\"65bf617vqx\" data-unid=\"491eb753209f6ccf211a2d4f922c03ed\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,R0lGODlhDwAPALMPAMrKygwMDJOTkz09PZWVla+vr3p6euTk5M7OzuXl5TMzMwAAAJmZmWZmZszMzP\/\/\/yH\/C05FVFNDQVBFMi4wAwEAAAAh+QQFCgAPACwAAAAADwAPAAAEQvDJaZaZOIcV8iQK8VRX4iTYoAwZ4iCYoAjZ4RxejhVNoT+mRGP4cyF4Pp0N98sBGIBMEMOotl6YZ3S61Bmbkm4mAgAh+QQFCgAPACwAAAAADQANAAAENPDJSRSZeA418itN8QiK8BiLITVsFiyBBIoYqnoewAD4xPw9iY4XLGYSjkQR4UAUD45DLwIAIfkEBQoADwAsAAAAAA8ACQAABC\/wyVlamTi3nSdgwFNdhEJgTJoNyoB9ISYoQmdjiZPcj7EYCAeCF1gEDo4Dz2eIAAAh+QQFCgAPACwCAAAADQANAAAEM\/DJBxiYeLKdX3IJZT1FU0iIg2RNKx3OkZVnZ98ToRD4MyiDnkAh6BkNC0MvsAj0kMpHBAAh+QQFCgAPACwGAAAACQAPAAAEMDC59KpFDll73HkAA2wVY5KgiK5b0RRoI6MuzG6EQqCDMlSGheEhUAgqgUUAFRySIgAh+QQFCgAPACwCAAIADQANAAAEM\/DJKZNLND\/kkKaHc3xk+QAMYDKsiaqmZCxGVjSFFCxB1vwy2oOgIDxuucxAMTAJFAJNBAAh+QQFCgAPACwAAAYADwAJAAAEMNAs86q1yaWwwv2Ig0jUZx3OYa4XoRAfwADXoAwfo1+CIjyFRuEho60aSNYlOPxEAAAh+QQFCgAPACwAAAIADQANAAAENPA9s4y8+IUVcqaWJ4qEQozSoAzoIyhCK2NFU2SJk0hNnyEOhKR2AzAAj4Pj4GE4W0bkJQIAOw==\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-44a6618gct\">#pt-cv-view-65bf617vqx .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-65bf617vqx  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-65bf617vqx .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-65bf617vqx .pt-cv-title a, #pt-cv-view-65bf617vqx  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-65bf617vqx  .pt-cv-title a:hover, #pt-cv-view-65bf617vqx  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-65bf617vqx .pt-cv-content , #pt-cv-view-65bf617vqx  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-65bf617vqx .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-65bf617vqx .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-65bf617vqx .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-65bf617vqx .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; }\n#pt-cv-view-65bf617vqx .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='65bf617vqx'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='65bf617vqx'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>QNAP\u2019s Buggy Security Fix Causes Chaos Richi Jennings | 5 days ago U.S. Agencies Seize Four North Korean IT Worker Scam Websites Jeffrey Burt | 1 week ago Here\u2019s Yet Another D-Link RCE That Won\u2019t be Fixed Richi Jennings | 1 week ago Microsoft Veeps Ignite Fire Under CrowdStrike Richi Jennings | November 20, 2024..<\/p>\n","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1762771","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industry Spotlight - Security Boulevard<\/title>\n<meta name=\"description\" content=\"The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/industry-spotlight\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industry Spotlight\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/industry-spotlight\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-05T13:19:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/industry-spotlight\/\",\"url\":\"https:\/\/securityboulevard.com\/industry-spotlight\/\",\"name\":\"Industry Spotlight - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2018-03-01T15:38:03+00:00\",\"dateModified\":\"2018-05-05T13:19:59+00:00\",\"description\":\"The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/industry-spotlight\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/industry-spotlight\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/industry-spotlight\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industry Spotlight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Industry Spotlight - Security Boulevard","description":"The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/industry-spotlight\/","og_locale":"en_US","og_type":"article","og_title":"Industry Spotlight","og_url":"https:\/\/securityboulevard.com\/industry-spotlight\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-05-05T13:19:59+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/industry-spotlight\/","url":"https:\/\/securityboulevard.com\/industry-spotlight\/","name":"Industry Spotlight - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2018-03-01T15:38:03+00:00","dateModified":"2018-05-05T13:19:59+00:00","description":"The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/industry-spotlight\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/industry-spotlight\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/industry-spotlight\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Industry Spotlight"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-7ozN","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1762771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1762771"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1762771\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1762771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}