{"id":1768878,"date":"2018-04-19T22:03:13","date_gmt":"2018-04-20T02:03:13","guid":{"rendered":"https:\/\/securityboulevard.com?page_id=1768878&#038;preview_id=1768878"},"modified":"2018-05-05T09:24:33","modified_gmt":"2018-05-05T13:24:33","slug":"features","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/features\/","title":{"rendered":"Features"},"content":{"rendered":"<div id=\"pl-1768878\"  class=\"panel-layout\" ><div id=\"pg-1768878-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1768878-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1768878-0-0-0\" class=\"widget_text so-panel widget_custom_html panel-first-child\" data-index=\"0\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"6fcd3addkv\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037657\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"Interpol Operation Synergia ransomware phishing\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-770x300.jpg 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-300x117.jpg 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-1024x399.jpg 1024w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-768x299.jpg 768w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-1536x598.jpg 1536w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0.jpg 1540w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_self cvplbd\" target=\"_self\" >Interpol, African Nations Arrest 1,006 in Sweeping \u2018Operation Serengeti\u2019<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-27T14:28:48-05:00\">4 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037607\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Sandbox-Proof-Concept-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_self cvplbd\" target=\"_self\" >Supply Chain Ransomware Attack Hits Starbucks, UK Grocers<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:37:56-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037597\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Three tiny people cleaning the inside of a hard drive\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#6fcd3addkv\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#6fcd3addkv\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-9a9e15etfq\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1768878-0-0-1\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-65bf617vqx\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037509\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"military\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/ai-generated-8662832_1280-1-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self cvplbd\" target=\"_self\" >Huge Leak of Customer Data Includes Military Personnel Info<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:07:01-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china\/' title='china' class='pt-cv-tax-china'>china<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/elasticsearch\/' title='elasticsearch' class='pt-cv-tax-elasticsearch'>elasticsearch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/enamelpins\/' title='enamelpins' class='pt-cv-tax-enamelpins'>enamelpins<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/leaked-data\/' title='leaked data' class='pt-cv-tax-leaked-data'>leaked data<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">EnamelPins, which manufactures and sells medals, pins, and other emblematic accessories, for months left open an Elasticsearch instance that exposed 300,000 customer emails, including 2,500 from military and government personnel. The company, based in California, also has links to China, Cybernews researchers wrote ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037480\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"China, threats, scams, CISA TP-Link Volt Typhoon Salt Typhoon\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/10\/China-Infiltrate-US-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/\" class=\"_self cvplbd\" target=\"_self\" >The Cyberthreats from China are Ongoing: U.S. Officials<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T07:32:00-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/salt-typhoon-cyberattack\/' title='Salt Typhoon cyberattack' class='pt-cv-tax-salt-typhoon-cyberattack'>Salt Typhoon cyberattack<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/telecom-networks\/' title='Telecom Networks' class='pt-cv-tax-telecom-networks'>Telecom Networks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/volt-typhoon\/' title='Volt Typhoon' class='pt-cv-tax-volt-typhoon'>Volt Typhoon<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">U.S. officials are pushing back at the ongoing threats posted by Chinese state-sponsored hackers like Volt Typhoon and Salt Typhoon, which have infiltrated critical infrastructure organizations to steal information and preposition themselves in case of a conflict breaking out between the two countries ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037379\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/nile-releases-zero-trust-as-a-service-aimed-at-delivering-ransomware-protection-natively-without-operational-headaches\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Nile\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/Nile-Trust-Service-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/nile-releases-zero-trust-as-a-service-aimed-at-delivering-ransomware-protection-natively-without-operational-headaches\/\" class=\"_self cvplbd\" target=\"_self\" >Nile Releases Zero Trust-as-a-Service Aimed at Delivering Ransomware Protection Natively Without Operational Headaches<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/sulagna-saha\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/08\/cropped-Bio-Picture-scaled-1-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Sulagna Saha<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T16:17:54-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/gestaltit\/' title='@GestaltIT' class='pt-cv-tax-gestaltit'>@GestaltIT<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/nilesecure\/' title='@NileSecure' class='pt-cv-tax-nilesecure'>@NileSecure<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/techfieldday\/' title='@TechFieldDay' class='pt-cv-tax-techfieldday'>@TechFieldDay<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/writeroftech1\/' title='@WriterOfTech1' class='pt-cv-tax-writeroftech1'>@WriterOfTech1<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Nile is working to make Local Area Network (LAN) invulnerable by design; its latest effort to stop ransomware and lateral movement attacks. The networking-as-a-service vendor, on Thursday, announced the launch of Nile Trust Service, an add-on solution that it said will end the need to deploy a medley of localized ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/nile-releases-zero-trust-as-a-service-aimed-at-delivering-ransomware-protection-natively-without-operational-headaches\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037360\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"North Korea IT worker scam\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Hackathons-Cybersecurity-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self cvplbd\" target=\"_self\" >U.S. Agencies Seize Four North Korean IT Worker Scam Websites<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T09:54:07-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/department-of-justice-doj\/' title='Department of Justice (DOJ)' class='pt-cv-tax-department-of-justice-doj'>Department of Justice (DOJ)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fake-it-worker-scam\/' title='fake IT worker scam' class='pt-cv-tax-fake-it-worker-scam'>fake IT worker scam<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/north-korean-cyber-espionage\/' title='North Korean cyber espionage' class='pt-cv-tax-north-korean-cyber-espionage'>North Korean cyber espionage<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">U.S. law enforcement agencies seized the websites of four North Korean fake IT worker scams that were uncovered by SentinelOne threat researchers and linked to a larger network of Chinese front companies ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037237\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"A D-Link DSR-250N, which is now EOL\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Here\u2019s Yet Another D-Link RCE That Won\u2019t be Fixed<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Richi Jennings<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T12:33:40-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/d-link\/' title='D-Link' class='pt-cv-tax-d-link'>D-Link<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-corporation\/' title='D-Link Corporation' class='pt-cv-tax-d-link-corporation'>D-Link Corporation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-vulnerability\/' title='D-Link vulnerability' class='pt-cv-tax-d-link-vulnerability'>D-Link vulnerability<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-zero-day\/' title='D-Link zero day' class='pt-cv-tax-d-link-zero-day'>D-Link zero day<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things\/' title='Internet of things' class='pt-cv-tax-internet-of-things'>Internet of things<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot\/' title='Internet of Things (IoT)' class='pt-cv-tax-internet-of-things-iot'>Internet of Things (IoT)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot-security\/' title='Internet of Things (IoT) Security' class='pt-cv-tax-internet-of-things-iot-security'>Internet of Things (IoT) Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-cyber-security\/' title='Internet of Things cyber security' class='pt-cv-tax-internet-of-things-cyber-security'>Internet of Things cyber security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037076\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-adds-raft-of-zero-trust-tools-and-platforms\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"platforms, security, tool, tooling, AI coding, tools, tools cybersecurity multi-tool\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/11\/tools-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-adds-raft-of-zero-trust-tools-and-platforms\/\" class=\"_self cvplbd\" target=\"_self\" >Microsoft Adds Raft of Zero-Trust Tools and Platforms<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/mike-vizard\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/Michael-Vizard_avatar_1507143790-40x40.png' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/10\/Michael-Vizard_avatar_1507143790-80x80.png 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Michael Vizard<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T14:17:27-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ai\/' title='AI' class='pt-cv-tax-ai'>AI<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-security\/' title='Data Security' class='pt-cv-tax-data-security'>Data Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft\/' title='Microsoft' class='pt-cv-tax-microsoft'>Microsoft<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/tools\/' title='tools' class='pt-cv-tax-tools'>tools<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Microsoft this week launched a raft of cybersecurity initiatives that address everything from making Windows platforms more secure to adding platforms that are more secure by design ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-adds-raft-of-zero-trust-tools-and-platforms\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037071\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/securing-the-software-supply-chain-checkmarx-one-expands-its-offerings\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/11\/Sandbox-Proof-Concept-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/securing-the-software-supply-chain-checkmarx-one-expands-its-offerings\/\" class=\"_self cvplbd\" target=\"_self\" >Securing the Software Supply Chain: Checkmarx One Expands its Offerings<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/alan\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2013\/05\/alan-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2013\/05\/alan-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Alan Shimel<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T13:56:52-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/sboms\/' title='SBOMs' class='pt-cv-tax-sboms'>SBOMs<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/shift-left\/' title='shift left' class='pt-cv-tax-shift-left'>shift left<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/supply-chain-security\/' title='supply chain security' class='pt-cv-tax-supply-chain-security'>supply chain security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/zero-trust\/' title='zero trust' class='pt-cv-tax-zero-trust'>zero trust<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The software supply chain is under siege. Threat actors increasingly exploit weaknesses in code repositories, dependencies and mismanaged secrets to infiltrate and disrupt software development processes. In response, organizations are turning to robust strategies to safeguard their supply chains, including tools like SCA scanning, AI and container security, secrets detection ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/securing-the-software-supply-chain-checkmarx-one-expands-its-offerings\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037060\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"David \u201cdwizzzle\u201d Weston\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Microsoft Veeps Ignite Fire Under CrowdStrike<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/b26f6b3c4f3ae8b2b257466976990747?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Richi Jennings<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T12:03:14-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike\/' title='CrowdStrike' class='pt-cv-tax-crowdstrike'>CrowdStrike<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-falcon\/' title='CrowdStrike Falcon' class='pt-cv-tax-crowdstrike-falcon'>CrowdStrike Falcon<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-incident\/' title='CrowdStrike incident;' class='pt-cv-tax-crowdstrike-incident'>CrowdStrike incident;<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-updates\/' title='crowdstrike updates' class='pt-cv-tax-crowdstrike-updates'>crowdstrike updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/david-weston\/' title='David Weston' class='pt-cv-tax-david-weston'>David Weston<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ignite\/' title='ignite' class='pt-cv-tax-ignite'>ignite<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft\/' title='Microsoft' class='pt-cv-tax-microsoft'>Microsoft<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-security\/' title='Microsoft security' class='pt-cv-tax-microsoft-security'>Microsoft security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-virus-initiative\/' title='Microsoft Virus Initiative' class='pt-cv-tax-microsoft-virus-initiative'>Microsoft Virus Initiative<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-windows\/' title='Microsoft Windows' class='pt-cv-tax-microsoft-windows'>Microsoft Windows<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/quick-machine-recovery\/' title='Quick Machine Recovery' class='pt-cv-tax-quick-machine-recovery'>Quick Machine Recovery<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/rust\/' title='rust' class='pt-cv-tax-rust'>rust<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/safe-deployment-practices\/' title='Safe Deployment Practices' class='pt-cv-tax-safe-deployment-practices'>Safe Deployment Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/windows\/' title='Windows' class='pt-cv-tax-windows'>Windows<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/windows-security\/' title='Windows security' class='pt-cv-tax-windows-security'>Windows security<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037018\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisos-look-to-establish-additional-leadership-roles\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"CISOs, leadership, security third-party supply chainCISO role\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/05\/Leadership-Security-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisos-look-to-establish-additional-leadership-roles\/\" class=\"_self cvplbd\" target=\"_self\" >CISOs Look to Establish Additional Leadership Roles<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/nathan-eddy\/\" rel=\"author\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/e6599346911a94e19de7d259040bf92d?s=40&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/e6599346911a94e19de7d259040bf92d?s=80&#038;d=mm&#038;r=g 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Nathan Eddy<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T10:49:16-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/compensation\/' title='compensation' class='pt-cv-tax-compensation'>compensation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ians\/' title='ians' class='pt-cv-tax-ians'>ians<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/it-security\/' title='IT Security' class='pt-cv-tax-it-security'>IT Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/recruiting\/' title='recruiting' class='pt-cv-tax-recruiting'>recruiting<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">According to an IANS survey of more than 800 CISOs, roles such as business information security officers (BISOs), chiefs of staff and heads for privacy, program management and data protection are among the top positions being considered to support cybersecurity efforts ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisos-look-to-establish-additional-leadership-roles\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037038\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"PCI DSS, third-party, businessmman with a credit card and computer\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/05\/credit-card-rupixen-Q59HmzK38eQ-unsplash-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self cvplbd\" target=\"_self\" >Black Friday Scammers are Hard at Work: Security Experts<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"><a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\"><img alt='Avatar photo' src='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-40x40.jpg' srcset='https:\/\/securityboulevard.com\/wp-content\/uploads\/2023\/07\/cropped-Jeffrey-Burt-photo-80x80.jpg 2x' class='avatar avatar-40 photo' height='40' width='40' \/><span>Jeffrey Burt<\/span><\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T09:00:12-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/black-friday\/' title='black friday' class='pt-cv-tax-black-friday'>black friday<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/impersonation-attacks\/' title='Impersonation attacks' class='pt-cv-tax-impersonation-attacks'>Impersonation attacks<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/online-shopping-scams\/' title='online shopping scams' class='pt-cv-tax-online-shopping-scams'>online shopping scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Scammers are using everything from fraudulent deals and fake ads to spoofed websites and brand impersonation to target online shoppers who are gearing up for Black Friday as the holiday buying season gets underway, according to cybersecurity firms ... <a href=\"https:\/\/securityboulevard.com\/2024\/11\/black-friday-scammers-are-hard-at-work-security-experts\/\" class=\"_self pt-cv-readmore pt-cv-textlink cvplbd\" target=\"_self\">Read More<\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1768878\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"381\" data-nextpages=\"2\" data-sid=\"65bf617vqx\" data-unid=\"48f11284fec6837616ddab1347eadddb\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-d1e7636inm\">#pt-cv-view-65bf617vqx .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-65bf617vqx  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-65bf617vqx .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-65bf617vqx .pt-cv-title a, #pt-cv-view-65bf617vqx  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-65bf617vqx  .pt-cv-title a:hover, #pt-cv-view-65bf617vqx  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-65bf617vqx .pt-cv-content , #pt-cv-view-65bf617vqx  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-65bf617vqx .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-65bf617vqx .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-65bf617vqx .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-65bf617vqx .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; }\n#pt-cv-view-65bf617vqx .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='65bf617vqx'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-65bf617vqx  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='65bf617vqx'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Interpol, African Nations Arrest 1,006 in Sweeping \u2018Operation Serengeti\u2019 Jeffrey Burt | 4 days ago Supply Chain Ransomware Attack Hits Starbucks, UK Grocers Jeffrey Burt | 5 days ago QNAP\u2019s Buggy Security Fix Causes Chaos Richi Jennings | 5 days ago Huge Leak of Customer Data Includes Military Personnel Info Jeffrey Burt | November 25,..<\/p>\n","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1768878","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Features - Security Boulevard<\/title>\n<meta name=\"description\" content=\"The Feature Section of Security Boulevard highlights exclusive content.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/features\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Features\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/features\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-05T13:24:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/features\/\",\"url\":\"https:\/\/securityboulevard.com\/features\/\",\"name\":\"Features - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2018-04-20T02:03:13+00:00\",\"dateModified\":\"2018-05-05T13:24:33+00:00\",\"description\":\"The Feature Section of Security Boulevard highlights exclusive content.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/features\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/features\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/features\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Features\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Features - Security Boulevard","description":"The Feature Section of Security Boulevard highlights exclusive content.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/features\/","og_locale":"en_US","og_type":"article","og_title":"Features","og_url":"https:\/\/securityboulevard.com\/features\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-05-05T13:24:33+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/features\/","url":"https:\/\/securityboulevard.com\/features\/","name":"Features - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2018-04-20T02:03:13+00:00","dateModified":"2018-05-05T13:24:33+00:00","description":"The Feature Section of Security Boulevard highlights exclusive content.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/features\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/features\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/features\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Features"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-7qai","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1768878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1768878"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1768878\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1768878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}