{"id":1778256,"date":"2018-07-22T03:25:02","date_gmt":"2018-07-22T07:25:02","guid":{"rendered":"https:\/\/securityboulevard.com\/?page_id=1778256"},"modified":"2024-03-14T13:09:40","modified_gmt":"2024-03-14T17:09:40","slug":"security-creators-network","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/security-creators-network\/","title":{"rendered":"Security Creators Network"},"content":{"rendered":"<h3>Weekly Top 10<\/h3>\n<div class=\"sue-panel\" data-url=\"\" data-target=\"self\" style=\"background-color:#f9f9f9;color:#333333;border-radius:2px;-moz-border-radius:2px;-webkit-border-radius:2px;box-shadow:0px 1px 2px #eeeeee;-moz-box-shadow:0px 1px 2px #eeeeee;-webkit-box-shadow:0px 1px 2px #eeeeee;border:1px solid #f9f9f9\"><div class=\"sue-panel-content sue-content-wrap\" style=\"padding:15px;text-align:left\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-nolf\" id=\"pt-cv-view-19d84d4g97\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"8eaa423n8x\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000><ol class=\"pt-cv-carousel-indicators\"><li data-target=\"#8eaa423n8x\" data-cvslide-to=\"0\" class=\"active\"><\/li>\n<li data-target=\"#8eaa423n8x\" data-cvslide-to=\"1\" class=\"\"><\/li>\n<li data-target=\"#8eaa423n8x\" data-cvslide-to=\"2\" class=\"\"><\/li>\n<li data-target=\"#8eaa423n8x\" data-cvslide-to=\"3\" class=\"\"><\/li>\n<li data-target=\"#8eaa423n8x\" data-cvslide-to=\"4\" class=\"\"><\/li>\n<li data-target=\"#8eaa423n8x\" data-cvslide-to=\"5\" class=\"\"><\/li>\n<li data-target=\"#8eaa423n8x\" data-cvslide-to=\"6\" class=\"\"><\/li>\n<li data-target=\"#8eaa423n8x\" data-cvslide-to=\"7\" class=\"\"><\/li>\n<li data-target=\"#8eaa423n8x\" data-cvslide-to=\"8\" class=\"\"><\/li>\n<li data-target=\"#8eaa423n8x\" data-cvslide-to=\"9\" class=\"\"><\/li><\/ol>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037597\"><div class=\"pt-cv-carousel-caption pt-cv-cap-wo-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_blank cvplbd\" target=\"_blank\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">RAID FAIL: NAS Maker does a CrowdStrike\u2014cleanup on \/dev\/dsk\/c1t2d3s4 please ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037509\"><div class=\"pt-cv-carousel-caption pt-cv-cap-wo-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_blank cvplbd\" target=\"_blank\" >Huge Leak of Customer Data Includes Military Personnel Info<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:07:01-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">EnamelPins, which manufactures and sells medals, pins, and other emblematic accessories, for months left open an Elasticsearch instance that exposed 300,000 customer emails, including 2,500 from military and government personnel. The company, based in California, also has links to China, Cybernews researchers wrote ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037607\"><div class=\"pt-cv-carousel-caption pt-cv-cap-wo-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_blank cvplbd\" target=\"_blank\" >Supply Chain Ransomware Attack Hits Starbucks, UK Grocers<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:37:56-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Coffee store giant Starbucks was among other organizations affected by a ransomware attack this month on cloud managed service provider Blue Yonder, a Panasonic subsidiary that has more than 3,000 customers. Two UK grocery chains also were impacted ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037639\"><div class=\"pt-cv-carousel-caption pt-cv-cap-wo-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/aws-reinvent-2024-optimize-your-kubernetes-with-fairwinds-and-netapp\/\" class=\"_blank cvplbd\" target=\"_blank\" >AWS re:Invent 2024: Optimize Your Kubernetes with Fairwinds and NetApp<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T16:28:54-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/mary-henry\/\" rel=\"author\">Mary Henry<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">AWS re:Invent 2024 is next week, right after a late Thanksgiving when we\u2019re kicking off the last few weeks of a busy year. For many organizations, now is the time to review costs and plan budgets. For many, that means taking a hard look at cloud spend and thinking about ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Fairwinds | Blog&feed_id=905&blog_url=https:\/\/www.fairwinds.com\/blog\">Fairwinds | Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037637\"><div class=\"pt-cv-carousel-caption pt-cv-cap-wo-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/why-you-should-stay-professionally-detached-from-the-vulns-you-find\/\" class=\"_blank cvplbd\" target=\"_blank\" >Why you should stay \u201cprofessionally detached\u201d from the vulns you find<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T12:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/dana-epp\/\" rel=\"author\">Dana Epp<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Learn how to stay professionally detached from the vulnerabilities you discover and disclose as part of your security research. The post Why you should stay \u201cprofessionally detached\u201d from the vulns you find appeared first on Dana Epp's Blog ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Dana Epp&#039;s Blog&feed_id=917&blog_url=https:\/\/danaepp.com\/\">Dana Epp&#039;s Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037657\"><div class=\"pt-cv-carousel-caption pt-cv-cap-wo-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_blank cvplbd\" target=\"_blank\" >Interpol, African Nations Arrest 1,006 in Sweeping \u2018Operation Serengeti\u2019<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-27T14:28:48-05:00\">4 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Interpol led 19 African countries in a massive anti-cybercriminal effort dubbed \"Operation Serengeti\" that shut down a range of scams and attacks that bled $193 million from 35,000 victims. More than 1,000 people were arrested and more than 134,000 malicious infrastructures shut down ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037649\"><div class=\"pt-cv-carousel-caption pt-cv-cap-wo-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\" class=\"_blank cvplbd\" target=\"_blank\" >Protecting Web-Based Work: Connecting People, Web Browsers and Security<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-27T03:03:19-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/anupam-upadyaya\/\" rel=\"author\">Anupam Upadyaya<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">With web browsers being the primary gateway to the internet, any security lapse can lead to broad opportunities for significant data breaches and operational disruptions ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037480\"><div class=\"pt-cv-carousel-caption pt-cv-cap-wo-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/\" class=\"_blank cvplbd\" target=\"_blank\" >The Cyberthreats from China are Ongoing: U.S. Officials<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T07:32:00-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">U.S. officials are pushing back at the ongoing threats posted by Chinese state-sponsored hackers like Volt Typhoon and Salt Typhoon, which have infiltrated critical infrastructure organizations to steal information and preposition themselves in case of a conflict breaking out between the two countries ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037622\"><div class=\"pt-cv-carousel-caption pt-cv-cap-wo-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/def-con-32-the-rise-and-fall-of-binary-exploitation\/\" class=\"_blank cvplbd\" target=\"_blank\" >DEF CON 32 &#8211; The Rise and Fall of Binary Exploitation<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T11:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/marc-handelman\/\" rel=\"author\">Marc Handelman<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Authors\/Presenters: Stephen Sims Our sincere appreciation to DEF CON, and the Presenters\/Authors for publishing their erudite DEF CON 32 content. Originating from the conference\u2019s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Infosecurity.US&feed_id=440&blog_url=https:\/\/www.infosecurity.us\/\">Infosecurity.US<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037629\"><div class=\"pt-cv-carousel-caption pt-cv-cap-wo-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/def-con-32-behind-enemy-lines-engaging-and-disrupting-ransomware-web-panel\/\" class=\"_blank cvplbd\" target=\"_blank\" >DEF CON 32 &#8211;  Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panel<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T15:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/marc-handelman\/\" rel=\"author\">Marc Handelman<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Authors\/Presenters: Vangelis Stykas Our sincere appreciation to DEF CON, and the Presenters\/Authors for publishing their erudite DEF CON 32 content. Originating from the conference\u2019s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Infosecurity.US&feed_id=440&blog_url=https:\/\/www.infosecurity.us\/\">Infosecurity.US<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-6e6218ej4n\">#pt-cv-view-19d84d4g97 .pt-cv-content-item { padding-right: 10px !important; padding-left: 10px !important; }\n#pt-cv-view-19d84d4g97  { margin-right: 0px !important; margin-left: 0px !important; }\n#pt-cv-view-19d84d4g97 .pt-cv-carousel-caption { padding-right: 10px !important; padding-bottom: 3px !important; padding-left: 10px !important; }\n#pt-cv-view-19d84d4g97 .pt-cv-carousel-caption { left : 0px !important }\n#pt-cv-view-19d84d4g97 .carousel-control.left { right : 35px }\n#pt-cv-view-19d84d4g97 .pt-cv-carousel-caption { right : 0px !important }\n#pt-cv-view-19d84d4g97 .carousel-control.right { right : 0px }\n#pt-cv-view-19d84d4g97 .row {margin: 0 0 !important}\n#pt-cv-view-19d84d4g97  .pt-cv-carousel-caption   { background-color: #f0f0f2 !important; }\n#pt-cv-view-19d84d4g97 .pt-cv-title a, #pt-cv-view-19d84d4g97  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 24px !important; line-height: 1.3 !important; color: #6190bb !important; }\n#pt-cv-view-19d84d4g97  .pt-cv-title a:hover, #pt-cv-view-19d84d4g97  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-19d84d4g97 .pt-cv-content , #pt-cv-view-19d84d4g97  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-19d84d4g97 .pt-cv-carousel-caption  { background-color: #f9f9f9 !important; }\n#pt-cv-view-19d84d4g97 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-19d84d4g97 .pt-cv-meta-fields {text-align: left; clear: both}\n#pt-cv-view-19d84d4g97 .pt-cv-meta-fields * { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-19d84d4g97 .pt-cv-custom-fields * { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; color: #6190bb !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-19d84d4g97 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-19d84d4g97 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-19d84d4g97  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-19d84d4g97  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='19d84d4g97'] a { font-family: 'Source Sans Pro', Arial, serif !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'> <\/div><\/div>\n<h3>Latest Posts<\/h3>\n<p>Consider Cybersecurity topics, authors and tags that you are interested in when trying to search. You can also enter your own custom <em>search criteria<\/em>. You can also <span class=\"st\">select a <em>topic or syndication source below <\/em>to filter all the blog posts.<\/span><\/p>\n<div class=\"pt-cv-wrapper\"><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"9982238a4v\" data-isblock=\"\" data-postid=\"\"><label for='sf_1775' class=\"cvp-label\">Search<\/label><input type=\"text\" id=\"sf_1775\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_category\" data-sid=\"9982238a4v\" data-isblock=\"\" data-postid=\"\"><label class=\"cvp-label\">Explore By Topic<\/label><select name=\"tx_category\"><option value=\"\">All<\/option><option value=\"sb\" >Security Boulevard (Original)<\/option><option value=\"sb-news\" >&nbsp;&nbsp;&nbsp;News<\/option><option value=\"sbn\" >Security Bloggers Network<\/option><option value=\"security-analytics\" >Analytics &amp; Intelligence<\/option><option value=\"application-security\" >Application Security<\/option><option value=\"careers\" >Careers<\/option><option value=\"ciso-suite\" >CISO Suite<\/option><option value=\"cloud-security\" >Cloud Security<\/option><option value=\"cyberlaw\" >Cyberlaw<\/option><option value=\"data-security\" >Data Security<\/option><option value=\"devops\" >DevOps<\/option><option value=\"endpoint\" >Endpoint<\/option><option value=\"governance-risk-compliance\" >Governance, Risk &amp; Compliance<\/option><option value=\"humor\" >Humor<\/option><option value=\"identity-access\" >Identity &amp; Access<\/option><option value=\"incident-response\" >Incident Response<\/option><option value=\"iot-ics-security\" >IoT &amp; ICS Security<\/option><option value=\"malware\" >Malware<\/option><option value=\"mobile-security\" >Mobile Security<\/option><option value=\"network-security\" >Network Security<\/option><option value=\"security-awareness\" >Security Awareness<\/option><option value=\"social-engineering\" >Social Engineering<\/option><option value=\"threats-breaches\" >Threats &amp; Breaches<\/option><option value=\"digital-currency\" >Digital Currency<\/option><option value=\"vulnerabilities\" >Vulnerabilities<\/option><option value=\"threat-intelligence\" >Threat Intelligence<\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"syndication_source\" data-sid=\"9982238a4v\" data-isblock=\"\" data-postid=\"\"><label class=\"cvp-label\">Syndication Source<\/label><select name=\"syndication_source\"><option value=\"\">All<\/option><option value=\" | TrustFour: TLS Compliance Monitoring | TrustFour: TLS Compliance Monitoring\" > | TrustFour: TLS Compliance Monitoring | TrustFour: TLS Compliance Monitoring<\/option><option value=\" | TrustFour: TLS Control Plane, Workload MFA | TrustFour: TLS Control Plane, Workload MFA\" > | TrustFour: TLS Control Plane, Workload MFA | TrustFour: TLS Control Plane, Workload MFA<\/option><option value=\" | TrustFour: Workload Identity and Interaction Security - mTLS Workload MFA | TrustFour: Workload Identity and Interaction Security - mTLS Workload MFA\" > | TrustFour: Workload Identity and Interaction Security - mTLS Workload MFA | TrustFour: Workload Identity and Interaction Security - mTLS Workload MFA<\/option><option value=\"&quot;Ask Aleada&quot; Blog - Aleada Consulting\" >&quot;Ask Aleada&quot; Blog - Aleada Consulting<\/option><option value=\"\/dev\/null - ramblings of an infosec professional\" >\/dev\/null - ramblings of an infosec professional<\/option><option value=\"1touch.io\" >1touch.io<\/option><option value=\"2024 Sonatype Blog\" >2024 Sonatype Blog<\/option><option value=\"4Data Solutions\" >4Data Solutions<\/option><option value=\"@&quot;figurative&quot;;\" >@&quot;figurative&quot;;<\/option><option value=\"@neirajones\" >@neirajones<\/option><option value=\"A Journey in Security\" >A Journey in Security<\/option><option value=\"A10 Networks Blog: Cyber Security\" >A10 Networks Blog: Cyber Security<\/option><option value=\"APIsec Blog\" >APIsec Blog<\/option><option value=\"ARCHIMEDIUS\" >ARCHIMEDIUS<\/option><option value=\"ARIA Cybersecurity Blog\" >ARIA Cybersecurity Blog<\/option><option value=\"ARMO\" >ARMO<\/option><option value=\"Acronis Blog - Modern data protection, backup and mobility made simple\" >Acronis Blog - Modern data protection, backup and mobility made simple<\/option><option value=\"Adaptive Shield\" >Adaptive Shield<\/option><option value=\"Adeptus-Mechanicus\" >Adeptus-Mechanicus<\/option><option value=\"Adopting Zero Trust\" >Adopting Zero Trust<\/option><option value=\"Aembit\" >Aembit<\/option><option value=\"Al Berg&#039;s Paranoid Prose\" >Al Berg&#039;s Paranoid Prose<\/option><option value=\"Alan Dekok\" >Alan Dekok<\/option><option value=\"Aleada Blog - Aleada Consulting\" >Aleada Blog - Aleada Consulting<\/option><option value=\"Alert Logic - Blogs Feed\" >Alert Logic - Blogs Feed<\/option><option value=\"Allot Blog\" >Allot Blog<\/option><option value=\"Allot&#039;s Network Security &amp; IoT Blog for CSPs &amp; Enterprises\" >Allot&#039;s Network Security &amp; IoT Blog for CSPs &amp; Enterprises<\/option><option value=\"Allure Security\" >Allure Security<\/option><option value=\"An Analytical Approach\" >An Analytical Approach<\/option><option value=\"Andrew Hay\" >Andrew Hay<\/option><option value=\"Anitian\" >Anitian<\/option><option value=\"Announcements - Ostrich Cyber-Risk\" >Announcements - Ostrich Cyber-Risk<\/option><option value=\"Anton Chuvakin\" >Anton Chuvakin<\/option><option value=\"Apeleg Blog\" >Apeleg Blog<\/option><option value=\"Apono\" >Apono<\/option><option value=\"AppOmni\" >AppOmni<\/option><option value=\"AppOmni feed\" >AppOmni feed<\/option><option value=\"AppSOC Security Blog\" >AppSOC Security Blog<\/option><option value=\"AppSec Observer\" >AppSec Observer<\/option><option value=\"AppViewX\" >AppViewX<\/option><option value=\"Appdome DevSec Blog | Secure Android &amp; iOS App Better\" >Appdome DevSec Blog | Secure Android &amp; iOS App Better<\/option><option value=\"Application Security Blog\" >Application Security Blog<\/option><option value=\"Application Security Research, News, and Education Blog\" >Application Security Research, News, and Education Blog<\/option><option value=\"Approov Blog\" >Approov Blog<\/option><option value=\"Apptega Blog\" >Apptega Blog<\/option><option value=\"Arkose Labs\" >Arkose Labs<\/option><option value=\"Armchair Stratosphere\" >Armchair Stratosphere<\/option><option value=\"Armis\" >Armis<\/option><option value=\"Article - Ontic\" >Article - Ontic<\/option><option value=\"Articles\" >Articles<\/option><option value=\"Articles - Accutive Security\" >Articles - Accutive Security<\/option><option value=\"Articles - Ontic\" >Articles - Ontic<\/option><option value=\"Artificial Intelligence and Big Data in Cyber Security | raffy.ch \u2013 Blog\" >Artificial Intelligence and Big Data in Cyber Security | raffy.ch \u2013 Blog<\/option><option value=\"Aryaka\" >Aryaka<\/option><option value=\"Assura, Inc.\" >Assura, Inc.<\/option><option value=\"Astra Security Blog\" >Astra Security Blog<\/option><option value=\"Astrix Security\" >Astrix Security<\/option><option value=\"Athena Dynamics\" >Athena Dynamics<\/option><option value=\"AttackIQ\" >AttackIQ<\/option><option value=\"Authentic8 Blog\" >Authentic8 Blog<\/option><option value=\"AuthenticID\" >AuthenticID<\/option><option value=\"Authomize\" >Authomize<\/option><option value=\"Avoid The Hack!\" >Avoid The Hack!<\/option><option value=\"Avoidthehack! RSS \" >Avoidthehack! RSS <\/option><option value=\"Axiad Cybersecurity Blog\" >Axiad Cybersecurity Blog<\/option><option value=\"Axio\" >Axio<\/option><option value=\"Axiomatics\" >Axiomatics<\/option><option value=\"Baffle\" >Baffle<\/option><option value=\"Banyan Security\" >Banyan Security<\/option><option value=\"Be Aware\" >Be Aware<\/option><option value=\"BehavioSec\" >BehavioSec<\/option><option value=\"Bejamas - Armorblox RSS Feed - Title !\" >Bejamas - Armorblox RSS Feed - Title !<\/option><option value=\"Berry Networks\" >Berry Networks<\/option><option value=\"Bitdefender Labs\" >Bitdefender Labs<\/option><option value=\"Bitglass Blog\" >Bitglass Blog<\/option><option value=\"BlackCloak | Protect Your Digital Life\u2122\" >BlackCloak | Protect Your Digital Life\u2122<\/option><option value=\"BlackFog\" >BlackFog<\/option><option value=\"Blaze&#039;s Security Blog\" >Blaze&#039;s Security Blog<\/option><option value=\"Blog\" >Blog<\/option><option value=\"Blog - Axiad\" >Blog - Axiad<\/option><option value=\"Blog - Cloudentity\" >Blog - Cloudentity<\/option><option value=\"Blog - Coro Cybersecurity\" >Blog - Coro Cybersecurity<\/option><option value=\"Blog - Enzoic\" >Blog - Enzoic<\/option><option value=\"Blog - Kaseya\" >Blog - Kaseya<\/option><option value=\"Blog - Penetration Testing UK - Sencode\" >Blog - Penetration Testing UK - Sencode<\/option><option value=\"Blog - Praetorian\" >Blog - Praetorian<\/option><option value=\"Blog - Sencode\" >Blog - Sencode<\/option><option value=\"Blog - Silverfort\" >Blog - Silverfort<\/option><option value=\"Blog - Sonrai Security\" >Blog - Sonrai Security<\/option><option value=\"Blog - Sweet\" >Blog - Sweet<\/option><option value=\"Blog - Tony Martin-Vegue\" >Blog - Tony Martin-Vegue<\/option><option value=\"Blog - Virtue Security\" >Blog - Virtue Security<\/option><option value=\"Blog Archive - Cyral\" >Blog Archive - Cyral<\/option><option value=\"Blog Archive - Ontic\" >Blog Archive - Ontic<\/option><option value=\"Blog Archive - PreVeil\" >Blog Archive - PreVeil<\/option><option value=\"Blog Archive | Keyfactor\" >Blog Archive | Keyfactor<\/option><option value=\"Blog Archive \u2013 Keyfactor\" >Blog Archive \u2013 Keyfactor<\/option><option value=\"Blog Archives - AI Enabled Security Automation\" >Blog Archives - AI Enabled Security Automation<\/option><option value=\"Blog Archives - AI-Enhanced Security Automation\" >Blog Archives - AI-Enhanced Security Automation<\/option><option value=\"Blog Archives - AI-enhanced Security Automation\" >Blog Archives - AI-enhanced Security Automation<\/option><option value=\"Blog Archives - Gurucul\" >Blog Archives - Gurucul<\/option><option value=\"Blog Archives - Low-Code Security Automation &amp; SOAR Platform | Swimlane\" >Blog Archives - Low-Code Security Automation &amp; SOAR Platform | Swimlane<\/option><option value=\"Blog Archives - stackArmor\" >Blog Archives - stackArmor<\/option><option value=\"Blog Category Feed\" >Blog Category Feed<\/option><option value=\"Blog Feed\" >Blog Feed<\/option><option value=\"Blog Posts \u2013 PolicyPak\" >Blog Posts \u2013 PolicyPak<\/option><option value=\"Blog RSS\" >Blog RSS<\/option><option value=\"Blog RSS feed\" >Blog RSS feed<\/option><option value=\"Blog | Akeyless\" >Blog | Akeyless<\/option><option value=\"Blog | Alert Logic\" >Blog | Alert Logic<\/option><option value=\"Blog | Avast EN\" >Blog | Avast EN<\/option><option value=\"Blog | Axiad\" >Blog | Axiad<\/option><option value=\"Blog | Castle\" >Blog | Castle<\/option><option value=\"Blog | Coro Cybersecurity\" >Blog | Coro Cybersecurity<\/option><option value=\"Blog | Enzoic\" >Blog | Enzoic<\/option><option value=\"Blog | Imperva\" >Blog | Imperva<\/option><option value=\"Blog | Latest Ransomware News and Trends | Coveware\" >Blog | Latest Ransomware News and Trends | Coveware<\/option><option value=\"Blog | LogicHub\u00ae\" >Blog | LogicHub\u00ae<\/option><option value=\"Blog | Pondurance\" >Blog | Pondurance<\/option><option value=\"Blog | Praetorian\" >Blog | Praetorian<\/option><option value=\"Blog | Scytale\" >Blog | Scytale<\/option><option value=\"Blog | Source Defense\" >Blog | Source Defense<\/option><option value=\"Blog | ZeroNorth\" >Blog | ZeroNorth<\/option><option value=\"Blog \u2013 AttackIQ\" >Blog \u2013 AttackIQ<\/option><option value=\"Blog \u2013 Balbix\" >Blog \u2013 Balbix<\/option><option value=\"Blog \u2013 Bolster AI\" >Blog \u2013 Bolster AI<\/option><option value=\"Blog \u2013 BreachLock\" >Blog \u2013 BreachLock<\/option><option value=\"Blog \u2013 CSPi\" >Blog \u2013 CSPi<\/option><option value=\"Blog \u2013 Checkmarx\" >Blog \u2013 Checkmarx<\/option><option value=\"Blog \u2013 CloudKnox\" >Blog \u2013 CloudKnox<\/option><option value=\"Blog \u2013 Cloudentity\" >Blog \u2013 Cloudentity<\/option><option value=\"Blog \u2013 Coro Cybersecurity\" >Blog \u2013 Coro Cybersecurity<\/option><option value=\"Blog \u2013 Critical Start\" >Blog \u2013 Critical Start<\/option><option value=\"Blog \u2013 CybeReady\" >Blog \u2013 CybeReady<\/option><option value=\"Blog \u2013 Cybersecurity Workforce Training on the Frontlines\" >Blog \u2013 Cybersecurity Workforce Training on the Frontlines<\/option><option value=\"Blog \u2013 Cyral\" >Blog \u2013 Cyral<\/option><option value=\"Blog \u2013 DataDome\" >Blog \u2013 DataDome<\/option><option value=\"Blog \u2013 Delta Risk\" >Blog \u2013 Delta Risk<\/option><option value=\"Blog \u2013 ERPScan\" >Blog \u2013 ERPScan<\/option><option value=\"Blog \u2013 Fidelis Cybersecurity\" >Blog \u2013 Fidelis Cybersecurity<\/option><option value=\"Blog \u2013 FirstPoint\" >Blog \u2013 FirstPoint<\/option><option value=\"Blog \u2013 Flashpoint\" >Blog \u2013 Flashpoint<\/option><option value=\"Blog \u2013 Gurucul\" >Blog \u2013 Gurucul<\/option><option value=\"Blog \u2013 Hysolate\" >Blog \u2013 Hysolate<\/option><option value=\"Blog \u2013 ID Agent\" >Blog \u2013 ID Agent<\/option><option value=\"Blog \u2013 Infocyte\" >Blog \u2013 Infocyte<\/option><option value=\"Blog \u2013 InfosecPlace\" >Blog \u2013 InfosecPlace<\/option><option value=\"Blog \u2013 Kaseya\" >Blog \u2013 Kaseya<\/option><option value=\"Blog \u2013 Keyfactor\" >Blog \u2013 Keyfactor<\/option><option value=\"Blog \u2013 Lastline\" >Blog \u2013 Lastline<\/option><option value=\"Blog \u2013 My Blog\" >Blog \u2013 My Blog<\/option><option value=\"Blog \u2013 Phoenix TS\" >Blog \u2013 Phoenix TS<\/option><option value=\"Blog \u2013 PolicyPak\" >Blog \u2013 PolicyPak<\/option><option value=\"Blog \u2013 PreVeil\" >Blog \u2013 PreVeil<\/option><option value=\"Blog \u2013 Protegrity\" >Blog \u2013 Protegrity<\/option><option value=\"Blog \u2013 Reflectiz\" >Blog \u2013 Reflectiz<\/option><option value=\"Blog \u2013 Respond Software\" >Blog \u2013 Respond Software<\/option><option value=\"Blog \u2013 SecZetta\" >Blog \u2013 SecZetta<\/option><option value=\"Blog \u2013 Secure Coding &amp; Cybersecurity Training\" >Blog \u2013 Secure Coding &amp; Cybersecurity Training<\/option><option value=\"Blog \u2013 Source Defence\" >Blog \u2013 Source Defence<\/option><option value=\"Blog \u2013 Source Defense\" >Blog \u2013 Source Defense<\/option><option value=\"Blog \u2013 ThreadFix\" >Blog \u2013 ThreadFix<\/option><option value=\"Blog \u2013 Threat Stack\" >Blog \u2013 Threat Stack<\/option><option value=\"Blog \u2013 VeriClouds\" >Blog \u2013 VeriClouds<\/option><option value=\"Blog \u2013 Virtue Security\" >Blog \u2013 Virtue Security<\/option><option value=\"Blog \u2013 WhiteSource\" >Blog \u2013 WhiteSource<\/option><option value=\"Blog \u2013 stackArmor\" >Blog \u2013 stackArmor<\/option><option value=\"Blog \u2014 VeriClouds\" >Blog \u2014 VeriClouds<\/option><option value=\"BlogInfoSec.com\" >BlogInfoSec.com<\/option><option value=\"Blogs - OpsCanvas\" >Blogs - OpsCanvas<\/option><option value=\"Blogs Archive - AppViewX\" >Blogs Archive - AppViewX<\/option><option value=\"Blogs Archive - Zimperium\" >Blogs Archive - Zimperium<\/option><option value=\"Blogs Archives - OpsCanvas\" >Blogs Archives - OpsCanvas<\/option><option value=\"Blogs List with categories \u2013 CipherCloud\" >Blogs List with categories \u2013 CipherCloud<\/option><option value=\"Blogs | Scytale\" >Blogs | Scytale<\/option><option value=\"Blogs \u2013 AppViewX\" >Blogs \u2013 AppViewX<\/option><option value=\"Blog|Traceable App &amp; API Security\" >Blog|Traceable App &amp; API Security<\/option><option value=\"BluBracket\" >BluBracket<\/option><option value=\"BluBracket: Code Security &amp; Secret Detection\" >BluBracket: Code Security &amp; Secret Detection<\/option><option value=\"Blue Box: The VoIP Security Podcast\" >Blue Box: The VoIP Security Podcast<\/option><option value=\"Blue Ocean\" >Blue Ocean<\/option><option value=\"Blueliv\" >Blueliv<\/option><option value=\"Boaz Gelbord\" >Boaz Gelbord<\/option><option value=\"Bolster Blog\" >Bolster Blog<\/option><option value=\"Branden R. Williams, Business Security Specialist\" >Branden R. Williams, Business Security Specialist<\/option><option value=\"Bricata\" >Bricata<\/option><option value=\"Bricata | Network Detection &amp; Response | Visibility &amp; Analytics | Threat Hunting\" >Bricata | Network Detection &amp; Response | Visibility &amp; Analytics | Threat Hunting<\/option><option value=\"Bright Ideas Blog\" >Bright Ideas Blog<\/option><option value=\"Bromium\" >Bromium<\/option><option value=\"Browse Parablu Blogs &amp; Data Protection Articles\" >Browse Parablu Blogs &amp; Data Protection Articles<\/option><option value=\"Business Insights In Virtualization and Cloud Security\" >Business Insights In Virtualization and Cloud Security<\/option><option value=\"CASB Vendors | Cloud Access Control Security Companies | CipherCloud\" >CASB Vendors | Cloud Access Control Security Companies | CipherCloud<\/option><option value=\"CCSI\" >CCSI<\/option><option value=\"CCSI, A Sourcepass Company\" >CCSI, A Sourcepass Company<\/option><option value=\"CISO Global\" >CISO Global<\/option><option value=\"CISO2CISO.COM &amp; CYBER SECURITY GROUP\" >CISO2CISO.COM &amp; CYBER SECURITY GROUP<\/option><option value=\"CQR\" >CQR<\/option><option value=\"Capsule8\" >Capsule8<\/option><option value=\"Carnal0wnage &amp; Attack Research Blog\" >Carnal0wnage &amp; Attack Research Blog<\/option><option value=\"Castle\" >Castle<\/option><option value=\"Cavelo Blog\" >Cavelo Blog<\/option><option value=\"Cavelo Blog and Press Release\" >Cavelo Blog and Press Release<\/option><option value=\"Centraleyes\" >Centraleyes<\/option><option value=\"Cequence\" >Cequence<\/option><option value=\"Cequence Security\" >Cequence Security<\/option><option value=\"Check Chain Mail and Hoaxes\" >Check Chain Mail and Hoaxes<\/option><option value=\"Cimcor Blog\" >Cimcor Blog<\/option><option value=\"Cipher Blog - English\" >Cipher Blog - English<\/option><option value=\"Cipher Cyber Security Blog\" >Cipher Cyber Security Blog<\/option><option value=\"CipherCloud\" >CipherCloud<\/option><option value=\"CipherCloud CASB+ Platform | Enterprise Cloud Security\" >CipherCloud CASB+ Platform | Enterprise Cloud Security<\/option><option value=\"Clearswift Blog\" >Clearswift Blog<\/option><option value=\"Click Armor\" >Click Armor<\/option><option value=\"Cloud Data Security | Eureka Security\" >Cloud Data Security | Eureka Security<\/option><option value=\"Cloud Sentry Blog\" >Cloud Sentry Blog<\/option><option value=\"Cloudanix Blog\" >Cloudanix Blog<\/option><option value=\"Cloudentity Blog | Identity Management and Authorization\" >Cloudentity Blog | Identity Management and Authorization<\/option><option value=\"Code Intelligence Blog\" >Code Intelligence Blog<\/option><option value=\"Code Red\" >Code Red<\/option><option value=\"Code42\" >Code42<\/option><option value=\"CodeSecure\" >CodeSecure<\/option><option value=\"Codifyre\" >Codifyre<\/option><option value=\"Cofense\" >Cofense<\/option><option value=\"Cofense Website\" >Cofense Website<\/option><option value=\"Cognitive Dissidents\" >Cognitive Dissidents<\/option><option value=\"Constella Intelligence\" >Constella Intelligence<\/option><option value=\"Constellation GovCloud\" >Constellation GovCloud<\/option><option value=\"Continuity\u2122\" >Continuity\u2122<\/option><option value=\"Continuous Authentication Through Behavioral Biometrics | BehavioSec\" >Continuous Authentication Through Behavioral Biometrics | BehavioSec<\/option><option value=\"Converging Network\" >Converging Network<\/option><option value=\"Cryptosmith\" >Cryptosmith<\/option><option value=\"Cyber Risk Quantification \" >Cyber Risk Quantification <\/option><option value=\"Cyber Security Awareness Training Blog | CybeReady\" >Cyber Security Awareness Training Blog | CybeReady<\/option><option value=\"Cyber Security on Security Boulevard Archives - Kiteworks\" >Cyber Security on Security Boulevard Archives - Kiteworks<\/option><option value=\"Cyber Security on Security Boulevard Archives - Kiteworks | Your Private Content Network\" >Cyber Security on Security Boulevard Archives - Kiteworks | Your Private Content Network<\/option><option value=\"Cyber Security on Security Boulevard \u2013 Accellion\" >Cyber Security on Security Boulevard \u2013 Accellion<\/option><option value=\"Cyber Security on Security Boulevard \u2013 Kiteworks\" >Cyber Security on Security Boulevard \u2013 Kiteworks<\/option><option value=\"Cyber Security \u2013 Strategy and Innovation\" >Cyber Security \u2013 Strategy and Innovation<\/option><option value=\"Cyber security services provider, data privacy consultant | Secureflo\" >Cyber security services provider, data privacy consultant | Secureflo<\/option><option value=\"CyberCrime &amp; Doing Time\" >CyberCrime &amp; Doing Time<\/option><option value=\"CyberSaint Blog\" >CyberSaint Blog<\/option><option value=\"CyberSecurity Journal \u2013 SSL2BUY\" >CyberSecurity Journal \u2013 SSL2BUY<\/option><option value=\"Cyberinc Blog\" >Cyberinc Blog<\/option><option value=\"Cybersecurity Best Practices\" >Cybersecurity Best Practices<\/option><option value=\"Cybersecurity Matters \u2013 DXC Blogs\" >Cybersecurity Matters \u2013 DXC Blogs<\/option><option value=\"Cyborg Security\" >Cyborg Security<\/option><option value=\"Cycode\" >Cycode<\/option><option value=\"Cycuity\" >Cycuity<\/option><option value=\"Cyera Blog\" >Cyera Blog<\/option><option value=\"Cylance Blog\" >Cylance Blog<\/option><option value=\"Cymbel Corporation\" >Cymbel Corporation<\/option><option value=\"Cynerio\" >Cynerio<\/option><option value=\"Cyphere\" >Cyphere<\/option><option value=\"Cyphere | Securing Your Cyber Sphere\" >Cyphere | Securing Your Cyber Sphere<\/option><option value=\"C\u0430\u0442\u0441\u043d\u00b2\u00b2 (in)s\u0435\u0441u\u044fit\u0443 \/ ChrisJohnRiley\" >C\u0430\u0442\u0441\u043d\u00b2\u00b2 (in)s\u0435\u0441u\u044fit\u0443 \/ ChrisJohnRiley<\/option><option value=\"D3 Security\" >D3 Security<\/option><option value=\"DTEX Systems\" >DTEX Systems<\/option><option value=\"DTEX Systems Inc\" >DTEX Systems Inc<\/option><option value=\"Dana Epp&#039;s Blog\" >Dana Epp&#039;s Blog<\/option><option value=\"Dancho Danchev&#039;s Blog - Mind Streams of Information Security Knowledge\" >Dancho Danchev&#039;s Blog - Mind Streams of Information Security Knowledge<\/option><option value=\"Dancho Danchev&#039;s Blog\" >Dancho Danchev&#039;s Blog<\/option><option value=\"Dancho Danchev&#039;s Blog - Mind Streams of Information Security Knowledge\" >Dancho Danchev&#039;s Blog - Mind Streams of Information Security Knowledge<\/option><option value=\"Data Security Blog  | Thales eSecurity\" >Data Security Blog  | Thales eSecurity<\/option><option value=\"DataDome\" >DataDome<\/option><option value=\"DataDome Blog \u2013 DataDome\" >DataDome Blog \u2013 DataDome<\/option><option value=\"Datcher Group Inc\" >Datcher Group Inc<\/option><option value=\"DeepFactor&#039;s Continuous Observability Blog\" >DeepFactor&#039;s Continuous Observability Blog<\/option><option value=\"DeepFactor&#039;s Continuous Observability Blog\" >DeepFactor&#039;s Continuous Observability Blog<\/option><option value=\"Deepfactor\" >Deepfactor<\/option><option value=\"Deepfence\" >Deepfence<\/option><option value=\"Defense Rests\" >Defense Rests<\/option><option value=\"Descope Learning Center\" >Descope Learning Center<\/option><option value=\"Devops Bridge\" >Devops Bridge<\/option><option value=\"Digital Defense\" >Digital Defense<\/option><option value=\"Digital Defense by HelpSystems\" >Digital Defense by HelpSystems<\/option><option value=\"Digital Defense, Inc.\" >Digital Defense, Inc.<\/option><option value=\"Digital Resolve\" >Digital Resolve<\/option><option value=\"DivvyCloud\" >DivvyCloud<\/option><option value=\"Doppler Blog\" >Doppler Blog<\/option><option value=\"Dr Anton Chuvakin Blog (Original)\" >Dr Anton Chuvakin Blog (Original)<\/option><option value=\"Dr Anton Chuvakin Blog PERSONAL Blog\" >Dr Anton Chuvakin Blog PERSONAL Blog<\/option><option value=\"Drupal blog posts\" >Drupal blog posts<\/option><option value=\"Dtex Systems\" >Dtex Systems<\/option><option value=\"Dtex Systems Inc\" >Dtex Systems Inc<\/option><option value=\"Dtex Systems \u2013 Enterprise User Intelligence\" >Dtex Systems \u2013 Enterprise User Intelligence<\/option><option value=\"Dtex Systems \u2013 User Behavior Intelligence\" >Dtex Systems \u2013 User Behavior Intelligence<\/option><option value=\"EB Control\" >EB Control<\/option><option value=\"ENHALO | A Cyber Security Defense Uniquely Designed For You\" >ENHALO | A Cyber Security Defense Uniquely Designed For You<\/option><option value=\"Early Guide to Black Hat 2018: Schedule, Trainings, &amp; More \u2013 Threat Stack\" >Early Guide to Black Hat 2018: Schedule, Trainings, &amp; More \u2013 Threat Stack<\/option><option value=\"EclecticIQ Blog\" >EclecticIQ Blog<\/option><option value=\"Eclypsium\" >Eclypsium<\/option><option value=\"Eclypsium | Supply Chain Security for the Modern Enterprise\" >Eclypsium | Supply Chain Security for the Modern Enterprise<\/option><option value=\"EdGuards \u2013 Security for Education\" >EdGuards \u2013 Security for Education<\/option><option value=\"Edge Threat Management \u2013 Arista\" >Edge Threat Management \u2013 Arista<\/option><option value=\"Ekran System\" >Ekran System<\/option><option value=\"Elie on Internet Security and Performance\" >Elie on Internet Security and Performance<\/option><option value=\"Emergent Chaos\" >Emergent Chaos<\/option><option value=\"EnableSecurity\" >EnableSecurity<\/option><option value=\"Endpoint Security\" >Endpoint Security<\/option><option value=\"Enhancing Digital Security with OpenID&#039;s Shared Signals Framework\" >Enhancing Digital Security with OpenID&#039;s Shared Signals Framework<\/option><option value=\"Enterprise Network Security Blog from IS Decisions\" >Enterprise Network Security Blog from IS Decisions<\/option><option value=\"Enterprise Network Security Blog from ISDecisions\" >Enterprise Network Security Blog from ISDecisions<\/option><option value=\"Enterprise Security Archives - Thales blog\" >Enterprise Security Archives - Thales blog<\/option><option value=\"Enterprise Security \u2013 Gemalto blog\" >Enterprise Security \u2013 Gemalto blog<\/option><option value=\"Enterprise Security \u2013 Thales blog\" >Enterprise Security \u2013 Thales blog<\/option><option value=\"Entro\" >Entro<\/option><option value=\"Entrust Blog\" >Entrust Blog<\/option><option value=\"Entrust Datacard Blog\" >Entrust Datacard Blog<\/option><option value=\"Enzoic\" >Enzoic<\/option><option value=\"Ericom Software\" >Ericom Software<\/option><option value=\"Ermetic\" >Ermetic<\/option><option value=\"Errata Security\" >Errata Security<\/option><option value=\"Escape - The API Security Blog\" >Escape - The API Security Blog<\/option><option value=\"Expert Insights on Synthetic Data from the Tonic.ai Blog\" >Expert Insights on Synthetic Data from the Tonic.ai Blog<\/option><option value=\"Fairwinds | Blog\" >Fairwinds | Blog<\/option><option value=\"Feroot\" >Feroot<\/option><option value=\"Feroot Security\" >Feroot Security<\/option><option value=\"FireMon\" >FireMon<\/option><option value=\"FireMon.com\" >FireMon.com<\/option><option value=\"Flare | Cyber Threat Intel | Digital Risk Protection\" >Flare | Cyber Threat Intel | Digital Risk Protection<\/option><option value=\"Fluid Attacks RSS Feed\" >Fluid Attacks RSS Feed<\/option><option value=\"Focus on Security\" >Focus on Security<\/option><option value=\"ForAllSecure Blog\" >ForAllSecure Blog<\/option><option value=\"Forescout\" >Forescout<\/option><option value=\"Forgerock Blog\" >Forgerock Blog<\/option><option value=\"Fortinet Blog | Latest Posts\" >Fortinet Blog | Latest Posts<\/option><option value=\"Frames And Bits - The Andrew Storms Blog\" >Frames And Bits - The Andrew Storms Blog<\/option><option value=\"Frontline Sentinel\" >Frontline Sentinel<\/option><option value=\"Fuel Blog | LoginRadius\" >Fuel Blog | LoginRadius<\/option><option value=\"GitGuardian Blog - Automated Secrets Detection\" >GitGuardian Blog - Automated Secrets Detection<\/option><option value=\"GitGuardian Blog - Code Security for the DevOps generation\" >GitGuardian Blog - Code Security for the DevOps generation<\/option><option value=\"GitGuardian Blog - Take Control of Your Secrets Security\" >GitGuardian Blog - Take Control of Your Secrets Security<\/option><option value=\"GlobalSign Blog RSS Feed\" >GlobalSign Blog RSS Feed<\/option><option value=\"GrammaTalk | Grammatech\" >GrammaTalk | Grammatech<\/option><option value=\"Grip Security Blog\" >Grip Security Blog<\/option><option value=\"GuardRails\" >GuardRails<\/option><option value=\"Gurucul Blog | Security Analytics | Machine Learning Models on Big Data\" >Gurucul Blog | Security Analytics | Machine Learning Models on Big Data<\/option><option value=\"HACK by Simon PG Edwards\" >HACK by Simon PG Edwards<\/option><option value=\"HOTforSecurity\" >HOTforSecurity<\/option><option value=\"HUNTERS\" >HUNTERS<\/option><option value=\"HUNTERS.AI\" >HUNTERS.AI<\/option><option value=\"HYAS Blog\" >HYAS Blog<\/option><option value=\"HYAS Blog - 2024\" >HYAS Blog - 2024<\/option><option value=\"HYPR Blog\" >HYPR Blog<\/option><option value=\"HackerNet\" >HackerNet<\/option><option value=\"Hackernet.IN\" >Hackernet.IN<\/option><option value=\"Haekka Blog\" >Haekka Blog<\/option><option value=\"Hashed Out by The SSL Store\u2122\" >Hashed Out by The SSL Store\u2122<\/option><option value=\"Health Security Solutions\" >Health Security Solutions<\/option><option value=\"HolistiCyber\" >HolistiCyber<\/option><option value=\"HolisticInfoSec\u2122\" >HolisticInfoSec\u2122<\/option><option value=\"Horizon3.ai\" >Horizon3.ai<\/option><option value=\"How is that Assurance Evidence? - Medium\" >How is that Assurance Evidence? - Medium<\/option><option value=\"Hunters\" >Hunters<\/option><option value=\"Hurricane Labs\" >Hurricane Labs<\/option><option value=\"Hyperproof\" >Hyperproof<\/option><option value=\"Hyperview\" >Hyperview<\/option><option value=\"Hysolate\" >Hysolate<\/option><option value=\"I Smell Packets\" >I Smell Packets<\/option><option value=\"I hack, therefore I am\" >I hack, therefore I am<\/option><option value=\"IBM Application Security Insider\" >IBM Application Security Insider<\/option><option value=\"ICO Security - Medium\" >ICO Security - Medium<\/option><option value=\"IDcentral\" >IDcentral<\/option><option value=\"ISHIR | Software Development India\" >ISHIR | Software Development India<\/option><option value=\"ISO 27001 &amp; ISO 22301 Blog \u2013 27001Academy\" >ISO 27001 &amp; ISO 22301 Blog \u2013 27001Academy<\/option><option value=\"ISO 27001 \u2013 Advisera\" >ISO 27001 \u2013 Advisera<\/option><option value=\"IT Best Practices and Compliance Reporting Information\" >IT Best Practices and Compliance Reporting Information<\/option><option value=\"IT Security &amp; Encryption\" >IT Security &amp; Encryption<\/option><option value=\"IT Security Expert Blog\" >IT Security Expert Blog<\/option><option value=\"IT Security \u2013 Intercity Technology\" >IT Security \u2013 Intercity Technology<\/option><option value=\"IT Security, Windows Scripting and other matters\" >IT Security, Windows Scripting and other matters<\/option><option value=\"IT Security: The view from here\" >IT Security: The view from here<\/option><option value=\"ITauditSecurity\" >ITauditSecurity<\/option><option value=\"Identient\" >Identient<\/option><option value=\"Identity &amp; Authentication Blog\" >Identity &amp; Authentication Blog<\/option><option value=\"Identity Blog\" >Identity Blog<\/option><option value=\"Idoneous Security\" >Idoneous Security<\/option><option value=\"Ignyte\" >Ignyte<\/option><option value=\"Impart Security\" >Impart Security<\/option><option value=\"Impart Security Blog\" >Impart Security Blog<\/option><option value=\"Imvision Blog\" >Imvision Blog<\/option><option value=\"Incisive\" >Incisive<\/option><option value=\"Indusface\" >Indusface<\/option><option value=\"Industry Archives - Datawiza\" >Industry Archives - Datawiza<\/option><option value=\"Industry Blog - SecZetta\" >Industry Blog - SecZetta<\/option><option value=\"Industry Blog | SecZetta\" >Industry Blog | SecZetta<\/option><option value=\"Info Loss\" >Info Loss<\/option><option value=\"InfoSec Mentors\" >InfoSec Mentors<\/option><option value=\"InfoSec Resources\" >InfoSec Resources<\/option><option value=\"Information Security Blog | Perimeter E-Security\" >Information Security Blog | Perimeter E-Security<\/option><option value=\"Information Security Strategy\" >Information Security Strategy<\/option><option value=\"Infosec Events\" >Infosec Events<\/option><option value=\"Infosec Pro\" >Infosec Pro<\/option><option value=\"Infosec Ramblings\" >Infosec Ramblings<\/option><option value=\"Infosec Resources\" >Infosec Resources<\/option><option value=\"Infosecurity.US\" >Infosecurity.US<\/option><option value=\"Inliniac\" >Inliniac<\/option><option value=\"Insecurity\" >Insecurity<\/option><option value=\"Insights | Cyber Security Experts | Sentrium Security\" >Insights | Cyber Security Experts | Sentrium Security<\/option><option value=\"Instart blog RSS\" >Instart blog RSS<\/option><option value=\"IntelliGO MDR Blog\" >IntelliGO MDR Blog<\/option><option value=\"Intertrust Technologies - Security Blogs\" >Intertrust Technologies - Security Blogs<\/option><option value=\"Invicti\" >Invicti<\/option><option value=\"IoT Blog \u2013 Speranza\" >IoT Blog \u2013 Speranza<\/option><option value=\"IronNet Blog\" >IronNet Blog<\/option><option value=\"J4vv4D\" >J4vv4D<\/option><option value=\"Jackwillk Security\" >Jackwillk Security<\/option><option value=\"Javvad Malik\" >Javvad Malik<\/option><option value=\"JeffSoh on NetSec\" >JeffSoh on NetSec<\/option><option value=\"Jeremiah Grossman\" >Jeremiah Grossman<\/option><option value=\"Joel Esler\" >Joel Esler<\/option><option value=\"Journal | LogonBox\" >Journal | LogonBox<\/option><option value=\"Journal \u2013 LogonBox\" >Journal \u2013 LogonBox<\/option><option value=\"Judy Blog\" >Judy Blog<\/option><option value=\"Jump ESP, jump!\" >Jump ESP, jump!<\/option><option value=\"K2io\" >K2io<\/option><option value=\"Kasada\" >Kasada<\/option><option value=\"Kellep Charles Information Security  Blog Space\" >Kellep Charles Information Security  Blog Space<\/option><option value=\"Keytos\" >Keytos<\/option><option value=\"Knowledge Center \u2013 PCI Pal\" >Knowledge Center \u2013 PCI Pal<\/option><option value=\"Knowledge Centre \u2013 PCI Pal\" >Knowledge Centre \u2013 PCI Pal<\/option><option value=\"Koen Hendrix\" >Koen Hendrix<\/option><option value=\"Kratikal Blog\" >Kratikal Blog<\/option><option value=\"Kratikal Blogs\" >Kratikal Blogs<\/option><option value=\"Krebs on Security\" >Krebs on Security<\/option><option value=\"Kubernetes Security And Misconfigurations With Jimmy Mesta \u2013 Scale to Zero\" >Kubernetes Security And Misconfigurations With Jimmy Mesta \u2013 Scale to Zero<\/option><option value=\"Labs Articles Archive - Sentrium Security\" >Labs Articles Archive - Sentrium Security<\/option><option value=\"Lambda Security\" >Lambda Security<\/option><option value=\"Laminar\" >Laminar<\/option><option value=\"Last In -  First Out\" >Last In -  First Out<\/option><option value=\"Last In - First Out\" >Last In - First Out<\/option><option value=\"Latest blog posts\" >Latest blog posts<\/option><option value=\"LaunchPointe: Payment Security\" >LaunchPointe: Payment Security<\/option><option value=\"Law Across the Wire and Into the Cloud\" >Law Across the Wire and Into the Cloud<\/option><option value=\"Law across the wire and into the cloud\" >Law across the wire and into the cloud<\/option><option value=\"LeaksID\" >LeaksID<\/option><option value=\"Legit Security Blog\" >Legit Security Blog<\/option><option value=\"Lightspin Blog\" >Lightspin Blog<\/option><option value=\"LimaCharlie&#039;s Blog\" >LimaCharlie&#039;s Blog<\/option><option value=\"Liquidmatrix Security Digest\" >Liquidmatrix Security Digest<\/option><option value=\"LogRhythm\" >LogRhythm<\/option><option value=\"LoginRadius\" >LoginRadius<\/option><option value=\"LoginRadius Blog\" >LoginRadius Blog<\/option><option value=\"LogonBox Journal\" >LogonBox Journal<\/option><option value=\"Lohrmann on Cybersecurity\" >Lohrmann on Cybersecurity<\/option><option value=\"Lookout Blogs\" >Lookout Blogs<\/option><option value=\"Luminate Blog\" >Luminate Blog<\/option><option value=\"MICROHACKERS\" >MICROHACKERS<\/option><option value=\"Mac Virus\" >Mac Virus<\/option><option value=\"Malwarebytes Labs\" >Malwarebytes Labs<\/option><option value=\"ManagedMethods\" >ManagedMethods<\/option><option value=\"ManagedMethods Cybersecurity, Safety &amp; Compliance for K-12\" >ManagedMethods Cybersecurity, Safety &amp; Compliance for K-12<\/option><option value=\"Mandos\" >Mandos<\/option><option value=\"Matt Flynn: Information Security | Identity &amp; Access Mgmt.\" >Matt Flynn: Information Security | Identity &amp; Access Mgmt.<\/option><option value=\"Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher\" >Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher<\/option><option value=\"Mend\" >Mend<\/option><option value=\"Menlo Security\" >Menlo Security<\/option><option value=\"Menlo Security Blog\" >Menlo Security Blog<\/option><option value=\"Michael Mongold&#039;s Technology Security\" >Michael Mongold&#039;s Technology Security<\/option><option value=\"Michael on Security\" >Michael on Security<\/option><option value=\"MichaelPeters.org\" >MichaelPeters.org<\/option><option value=\"Mike Rothman&#039;s blog\" >Mike Rothman&#039;s blog<\/option><option value=\"MixMode\" >MixMode<\/option><option value=\"Mobile &amp; Cellular Cyber Security Blog Posts and Articles - FirstPoint\" >Mobile &amp; Cellular Cyber Security Blog Posts and Articles - FirstPoint<\/option><option value=\"Mobile Threat Blog Posts | Appthority\" >Mobile Threat Blog Posts | Appthority<\/option><option value=\"ModernCyber Blog\" >ModernCyber Blog<\/option><option value=\"Moonsense\" >Moonsense<\/option><option value=\"Moonsense \u2013 Risk Data Cloud\" >Moonsense \u2013 Risk Data Cloud<\/option><option value=\"NETRESEC Network Security Blog\" >NETRESEC Network Security Blog<\/option><option value=\"NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.\" >NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.<\/option><option value=\"NYA\" >NYA<\/option><option value=\"Netography\" >Netography<\/option><option value=\"Netsparker, Web Application Security Scanner\" >Netsparker, Web Application Security Scanner<\/option><option value=\"Network Security Blog\" >Network Security Blog<\/option><option value=\"Network World Cisco Security Expert\" >Network World Cisco Security Expert<\/option><option value=\"News\" >News<\/option><option value=\"News and Views \u2013 Netswitch Technology Management\" >News and Views \u2013 Netswitch Technology Management<\/option><option value=\"Nisos\" >Nisos<\/option><option value=\"No Tricks\" >No Tricks<\/option><option value=\"Noetic: Cyber Asset Attack Surface &amp; Controls Management\" >Noetic: Cyber Asset Attack Surface &amp; Controls Management<\/option><option value=\"Noname API Security Blog\" >Noname API Security Blog<\/option><option value=\"NuData Security\" >NuData Security<\/option><option value=\"NuData Security, A Mastercard Company\" >NuData Security, A Mastercard Company<\/option><option value=\"Nudge Security Blog\" >Nudge Security Blog<\/option><option value=\"Nuspire\" >Nuspire<\/option><option value=\"OX Security\" >OX Security<\/option><option value=\"Obsidian Security\" >Obsidian Security<\/option><option value=\"Ordr Blog - Ordr\" >Ordr Blog - Ordr<\/option><option value=\"Our Blog \u2013 DFLabs\" >Our Blog \u2013 DFLabs<\/option><option value=\"PKI Blog\" >PKI Blog<\/option><option value=\"PKTZ\" >PKTZ<\/option><option value=\"Palmer on Cyber\" >Palmer on Cyber<\/option><option value=\"Pathlock\" >Pathlock<\/option><option value=\"PeoplActive\" >PeoplActive<\/option><option value=\"Perception Point\" >Perception Point<\/option><option value=\"PerimeterX Blog\" >PerimeterX Blog<\/option><option value=\"Posts By SpecterOps Team Members - Medium\" >Posts By SpecterOps Team Members - Medium<\/option><option value=\"Posts on malicious.link\" >Posts on malicious.link<\/option><option value=\"PowerDMARC\" >PowerDMARC<\/option><option value=\"Praetorian Prefect\" >Praetorian Prefect<\/option><option value=\"PreVeil\" >PreVeil<\/option><option value=\"Preempt Blog\" >Preempt Blog<\/option><option value=\"Privacy &amp; Security \u2013 Joel Latto\" >Privacy &amp; Security \u2013 Joel Latto<\/option><option value=\"Private Tunnel\" >Private Tunnel<\/option><option value=\"Professionally Evil Insights\" >Professionally Evil Insights<\/option><option value=\"Pulse Secure Blog\" >Pulse Secure Blog<\/option><option value=\"Punto 1\" >Punto 1<\/option><option value=\"PureSec Blog\" >PureSec Blog<\/option><option value=\"PureSec Blog (Launch)\" >PureSec Blog (Launch)<\/option><option value=\"Qmulos\" >Qmulos<\/option><option value=\"RSA Blog\" >RSA Blog<\/option><option value=\"RSAConference Blogs RSS Feed\" >RSAConference Blogs RSS Feed<\/option><option value=\"RSS | Veracode Blog\" >RSS | Veracode Blog<\/option><option value=\"Radware Blog\" >Radware Blog<\/option><option value=\"Rainbow and Unicorn\" >Rainbow and Unicorn<\/option><option value=\"Random Security\" >Random Security<\/option><option value=\"Rational Survivability\" >Rational Survivability<\/option><option value=\"Reason Cybersecurity\" >Reason Cybersecurity<\/option><option value=\"Red Button\" >Red Button<\/option><option value=\"Research Blog\" >Research Blog<\/option><option value=\"Research Blogs Feed\" >Research Blogs Feed<\/option><option value=\"Resources\" >Resources<\/option><option value=\"Resources - Blog\" >Resources - Blog<\/option><option value=\"Resources Archive | Trustero\" >Resources Archive | Trustero<\/option><option value=\"Resources | Trustero\" >Resources | Trustero<\/option><option value=\"Reusable Security\" >Reusable Security<\/option><option value=\"RevealSecurity\" >RevealSecurity<\/option><option value=\"ReversingLabs Blog\" >ReversingLabs Blog<\/option><option value=\"Rezilion\" >Rezilion<\/option><option value=\"Rezonate\" >Rezonate<\/option><option value=\"Rick Holland \u2013 Digital Shadows\" >Rick Holland \u2013 Digital Shadows<\/option><option value=\"Risk Intelligence Academy \u2013 Iceberg Networks\" >Risk Intelligence Academy \u2013 Iceberg Networks<\/option><option value=\"RiskLens Resources\" >RiskLens Resources<\/option><option value=\"Robert Penz Blog\" >Robert Penz Blog<\/option><option value=\"Roger Halbheer on Security\" >Roger Halbheer on Security<\/option><option value=\"Rory.Blog\" >Rory.Blog<\/option><option value=\"Rss blog\" >Rss blog<\/option><option value=\"SANS Blog\" >SANS Blog<\/option><option value=\"SANS Digital Forensics and Incident Response Blog\" >SANS Digital Forensics and Incident Response Blog<\/option><option value=\"SE Labs Blog\" >SE Labs Blog<\/option><option value=\"SPECIAL EDITION\" >SPECIAL EDITION<\/option><option value=\"Safe-T Blog\" >Safe-T Blog<\/option><option value=\"SafeBreach\" >SafeBreach<\/option><option value=\"SafePaaS\" >SafePaaS<\/option><option value=\"Salt Security blog\" >Salt Security blog<\/option><option value=\"Scalefusion Blog\" >Scalefusion Blog<\/option><option value=\"Schneier on Security\" >Schneier on Security<\/option><option value=\"Seceon\" >Seceon<\/option><option value=\"Seceon Inc\" >Seceon Inc<\/option><option value=\"Sectigo\" >Sectigo<\/option><option value=\"Sectrio\" >Sectrio<\/option><option value=\"SecuraBit\" >SecuraBit<\/option><option value=\"Secure Code Warrior\" >Secure Code Warrior<\/option><option value=\"SecureFLO\" >SecureFLO<\/option><option value=\"SecureIQLab\" >SecureIQLab<\/option><option value=\"SecuriTeam Blogs\" >SecuriTeam Blogs<\/option><option value=\"Securiti\" >Securiti<\/option><option value=\"Security Aegis\" >Security Aegis<\/option><option value=\"Security Archives - TechSpective\" >Security Archives - TechSpective<\/option><option value=\"Security Archives | TechSpective\" >Security Archives | TechSpective<\/option><option value=\"Security Audit Systems\" >Security Audit Systems<\/option><option value=\"Security Balance\" >Security Balance<\/option><option value=\"Security Balance - Augusto Barros\" >Security Balance - Augusto Barros<\/option><option value=\"Security Blog Posts - Azul\" >Security Blog Posts - Azul<\/option><option value=\"Security Blog | Praetorian\" >Security Blog | Praetorian<\/option><option value=\"Security Boulevard\" >Security Boulevard<\/option><option value=\"Security Boulevard \u2013 Spectral\" >Security Boulevard \u2013 Spectral<\/option><option value=\"Security Catalyst\" >Security Catalyst<\/option><option value=\"Security Coin\" >Security Coin<\/option><option value=\"Security Connections\" >Security Connections<\/option><option value=\"Security Data Visualization\" >Security Data Visualization<\/option><option value=\"Security Ever After\" >Security Ever After<\/option><option value=\"Security Ever After \u2013 CISO\" >Security Ever After \u2013 CISO<\/option><option value=\"Security Ever After \u2013 Make Cyber Simple\" >Security Ever After \u2013 Make Cyber Simple<\/option><option value=\"Security Ever After \u2013 vCISO\" >Security Ever After \u2013 vCISO<\/option><option value=\"Security Executive Council Faculty Advisor\" >Security Executive Council Faculty Advisor<\/option><option value=\"Security Generation\" >Security Generation<\/option><option value=\"Security In The Virtual World\" >Security In The Virtual World<\/option><option value=\"Security Influencers Blog\" >Security Influencers Blog<\/option><option value=\"Security Intelligence and Big Data | raffy.ch \u2013 blog\" >Security Intelligence and Big Data | raffy.ch \u2013 blog<\/option><option value=\"Security Mike&#039;s Blog\" >Security Mike&#039;s Blog<\/option><option value=\"Security News \u2013 Packt Hub\" >Security News \u2013 Packt Hub<\/option><option value=\"Security Research | Blog Category Feed\" >Security Research | Blog Category Feed<\/option><option value=\"Security Retentive\" >Security Retentive<\/option><option value=\"Security TechWatch\" >Security TechWatch<\/option><option value=\"Security Through Education\" >Security Through Education<\/option><option value=\"Security Workshop\" >Security Workshop<\/option><option value=\"Security and risk\" >Security and risk<\/option><option value=\"Security boulevard - Spectral\" >Security boulevard - Spectral<\/option><option value=\"Security boulevard \u2013 Spectral\" >Security boulevard \u2013 Spectral<\/option><option value=\"Security culture and other ramblings - Medium\" >Security culture and other ramblings - Medium<\/option><option value=\"Security \u2013 TechSpective\" >Security \u2013 TechSpective<\/option><option value=\"Security4all - Dedicated to digital security, enterprise 2.0 and presentation skills\" >Security4all - Dedicated to digital security, enterprise 2.0 and presentation skills<\/option><option value=\"SecurityEverAfter\" >SecurityEverAfter<\/option><option value=\"SecurityOrb.com\" >SecurityOrb.com<\/option><option value=\"SecurityRamblings.com\" >SecurityRamblings.com<\/option><option value=\"Securosis Blog\" >Securosis Blog<\/option><option value=\"Semafone\" >Semafone<\/option><option value=\"Semperis\" >Semperis<\/option><option value=\"Seven Elements\" >Seven Elements<\/option><option value=\"Shape Security Blog\" >Shape Security Blog<\/option><option value=\"Shared Security\" >Shared Security<\/option><option value=\"Shared Security Podcast\" >Shared Security Podcast<\/option><option value=\"Shift Left\" >Shift Left<\/option><option value=\"ShiftLeft Academy | CodeSecure\" >ShiftLeft Academy | CodeSecure<\/option><option value=\"ShiftLeft Academy | Grammatech\" >ShiftLeft Academy | Grammatech<\/option><option value=\"ShiftLeft Blog - Medium\" >ShiftLeft Blog - Medium<\/option><option value=\"Siemplify\" >Siemplify<\/option><option value=\"Sift Blog\" >Sift Blog<\/option><option value=\"Signal Hill Technologies\" >Signal Hill Technologies<\/option><option value=\"Signal Sciences\" >Signal Sciences<\/option><option value=\"Signpost Six\" >Signpost Six<\/option><option value=\"SilverSky\" >SilverSky<\/option><option value=\"Silverfort Blog - Cyber Security News\" >Silverfort Blog - Cyber Security News<\/option><option value=\"Skeeter Spray\" >Skeeter Spray<\/option><option value=\"SlashNext\" >SlashNext<\/option><option value=\"SnapAttack - Medium\" >SnapAttack - Medium<\/option><option value=\"Social-Engineer, LLC\" >Social-Engineer, LLC<\/option><option value=\"Social-Engineer, LLC.\" >Social-Engineer, LLC.<\/option><option value=\"Social-Engineer.Com \u2013 Professional Social Engineering Training and Services\" >Social-Engineer.Com \u2013 Professional Social Engineering Training and Services<\/option><option value=\"Software Integrity\" >Software Integrity<\/option><option value=\"Software Integrity Blog\" >Software Integrity Blog<\/option><option value=\"Software Security\" >Software Security<\/option><option value=\"Solvo\" >Solvo<\/option><option value=\"Sonar Blog RSS feed\" >Sonar Blog RSS feed<\/option><option value=\"Sonatype Blog\" >Sonatype Blog<\/option><option value=\"Sonatype Blog NEW 2024\" >Sonatype Blog NEW 2024<\/option><option value=\"Sonrai | Enterprise Cloud Security Platform\" >Sonrai | Enterprise Cloud Security Platform<\/option><option value=\"Sovy\" >Sovy<\/option><option value=\"Spanning\" >Spanning<\/option><option value=\"Speaking of Malware | The Strongarm Blog \u2013 Strongarm Malware Protection\" >Speaking of Malware | The Strongarm Blog \u2013 Strongarm Malware Protection<\/option><option value=\"SpyLogic.net\" >SpyLogic.net<\/option><option value=\"SquareX Labs - Medium\" >SquareX Labs - Medium<\/option><option value=\"Srini Addepalli, Author at Aryaka\" >Srini Addepalli, Author at Aryaka<\/option><option value=\"SternX Technology\" >SternX Technology<\/option><option value=\"Stories by Anton Chuvakin on Medium\" >Stories by Anton Chuvakin on Medium<\/option><option value=\"Stories by Barak Brudo on Medium\" >Stories by Barak Brudo on Medium<\/option><option value=\"Stories by Excalibur  on Medium\" >Stories by Excalibur  on Medium<\/option><option value=\"Stories by John P. Gormally on Medium\" >Stories by John P. Gormally on Medium<\/option><option value=\"Stories by John P. Gormally, SR on Medium\" >Stories by John P. Gormally, SR on Medium<\/option><option value=\"Stories by Matt Palmer on Medium\" >Stories by Matt Palmer on Medium<\/option><option value=\"Strata.io\" >Strata.io<\/option><option value=\"Strategic Security Insights Archives - Topo.ai\" >Strategic Security Insights Archives - Topo.ai<\/option><option value=\"Strategic Security Insights \u2013 Topo.ai\" >Strategic Security Insights \u2013 Topo.ai<\/option><option value=\"Strobes Blog : Vulnerability Management, Penetration Testing, DevSecOps\" >Strobes Blog : Vulnerability Management, Penetration Testing, DevSecOps<\/option><option value=\"Strobes Security\" >Strobes Security<\/option><option value=\"StrongBox IT\" >StrongBox IT<\/option><option value=\"SurfWatch Labs, Inc.\" >SurfWatch Labs, Inc.<\/option><option value=\"Suspicious Minds\" >Suspicious Minds<\/option><option value=\"Swimlane\" >Swimlane<\/option><option value=\"Swimlane (en-US)\" >Swimlane (en-US)<\/option><option value=\"Symmetry Systems\" >Symmetry Systems<\/option><option value=\"Tala Blog\" >Tala Blog<\/option><option value=\"TalkSecure | CodeSecure\" >TalkSecure | CodeSecure<\/option><option value=\"Talking Identity\" >Talking Identity<\/option><option value=\"Talking Identity | Nishant Kaushik&#039;s Look at the World of Identity Management\" >Talking Identity | Nishant Kaushik&#039;s Look at the World of Identity Management<\/option><option value=\"Team Cymru\" >Team Cymru<\/option><option value=\"Techdulla\" >Techdulla<\/option><option value=\"Technicalinfo.net Blog\" >Technicalinfo.net Blog<\/option><option value=\"Technomagic\" >Technomagic<\/option><option value=\"Tenable Blog\" >Tenable Blog<\/option><option value=\"Tenable Cloud Security\" >Tenable Cloud Security<\/option><option value=\"Terebrate\" >Terebrate<\/option><option value=\"Thales CPL Blog Feed\" >Thales CPL Blog Feed<\/option><option value=\"The AVIEN Blog\" >The AVIEN Blog<\/option><option value=\"The Akamai Blog\" >The Akamai Blog<\/option><option value=\"The CISO Perspective\" >The CISO Perspective<\/option><option value=\"The Coalfire Blog\" >The Coalfire Blog<\/option><option value=\"The Container Security Blog on StackRox\" >The Container Security Blog on StackRox<\/option><option value=\"The Cyber Hut\" >The Cyber Hut<\/option><option value=\"The Dazz Blog blog\" >The Dazz Blog blog<\/option><option value=\"The Ethical Hacker Network\" >The Ethical Hacker Network<\/option><option value=\"The Falcon&#039;s View\" >The Falcon&#039;s View<\/option><option value=\"The FusionAuth Blog\" >The FusionAuth Blog<\/option><option value=\"The Guiding Point | GuidePoint Security\" >The Guiding Point | GuidePoint Security<\/option><option value=\"The ISO 27001 &amp; ISO 22301 Blog \u2013 27001Academy\" >The ISO 27001 &amp; ISO 22301 Blog \u2013 27001Academy<\/option><option value=\"The IT Security Guy\" >The IT Security Guy<\/option><option value=\"The Last Watchdog\" >The Last Watchdog<\/option><option value=\"The Laws of Vulnerabilities \u2013 Qualys Blog\" >The Laws of Vulnerabilities \u2013 Qualys Blog<\/option><option value=\"The Mission Secure Blog\" >The Mission Secure Blog<\/option><option value=\"The Next CISO\" >The Next CISO<\/option><option value=\"The PhishLabs Blog\" >The PhishLabs Blog<\/option><option value=\"The Security Mentor\" >The Security Mentor<\/option><option value=\"The Security Practice\" >The Security Practice<\/option><option value=\"The Security Shoggoth\" >The Security Shoggoth<\/option><option value=\"The Shared Security Show\" >The Shared Security Show<\/option><option value=\"The Spamhaus Project\" >The Spamhaus Project<\/option><option value=\"The State of Security\" >The State of Security<\/option><option value=\"Threat Center Live Blog\" >Threat Center Live Blog<\/option><option value=\"Threat Geek Blog - Fidelis Cybersecurity\" >Threat Geek Blog - Fidelis Cybersecurity<\/option><option value=\"Threat Geek Blog \u2013 Fidelis Cybersecurity\" >Threat Geek Blog \u2013 Fidelis Cybersecurity<\/option><option value=\"Threat Intelligence Blog | Flashpoint\" >Threat Intelligence Blog | Flashpoint<\/option><option value=\"Threat Researchers Newsletter\" >Threat Researchers Newsletter<\/option><option value=\"ThreatX Blog\" >ThreatX Blog<\/option><option value=\"Through the looking glass....\" >Through the looking glass....<\/option><option value=\"Thundra blog\" >Thundra blog<\/option><option value=\"Thycotic\" >Thycotic<\/option><option value=\"Tidal Cyber Blog\" >Tidal Cyber Blog<\/option><option value=\"Tinfoil Security Blog\" >Tinfoil Security Blog<\/option><option value=\"Trail of Bits Blog\" >Trail of Bits Blog<\/option><option value=\"TriGeoSphere\" >TriGeoSphere<\/option><option value=\"TrueFort\" >TrueFort<\/option><option value=\"TrustCloud\" >TrustCloud<\/option><option value=\"TrustLogix\" >TrustLogix<\/option><option value=\"Trusted Computing Group\" >Trusted Computing Group<\/option><option value=\"TuxCare\" >TuxCare<\/option><option value=\"Uncommon Sense Security\" >Uncommon Sense Security<\/option><option value=\"Untangle\" >Untangle<\/option><option value=\"Uptycs Blog\" >Uptycs Blog<\/option><option value=\"VERITI\" >VERITI<\/option><option value=\"Valimail\" >Valimail<\/option><option value=\"Vaporstream\" >Vaporstream<\/option><option value=\"Venafi Blog\" >Venafi Blog<\/option><option value=\"Veriti\" >Veriti<\/option><option value=\"Verodin Blog\" >Verodin Blog<\/option><option value=\"Viakoo Blog\" >Viakoo Blog<\/option><option value=\"Viakoo, Inc\" >Viakoo, Inc<\/option><option value=\"Vigilant Software Blog\" >Vigilant Software Blog<\/option><option value=\"Vigilant Software \u2013 Compliance Software Blog\" >Vigilant Software \u2013 Compliance Software Blog<\/option><option value=\"Vincent Arnold\" >Vincent Arnold<\/option><option value=\"Virsec Blog\" >Virsec Blog<\/option><option value=\"Voice of VOIPSA\" >Voice of VOIPSA<\/option><option value=\"Votiro\" >Votiro<\/option><option value=\"Wallarm\" >Wallarm<\/option><option value=\"WeSecureApp :: Securing Offensively\" >WeSecureApp :: Securing Offensively<\/option><option value=\"WeSecureApp :: Simplifying Enterprise Security\" >WeSecureApp :: Simplifying Enterprise Security<\/option><option value=\"WeSecureApp :: Simplifying Enterprise Security!\" >WeSecureApp :: Simplifying Enterprise Security!<\/option><option value=\"Web Security Blog | Acunetix\" >Web Security Blog | Acunetix<\/option><option value=\"Web Security Blog \u2013 Acunetix\" >Web Security Blog \u2013 Acunetix<\/option><option value=\"Why understanding IAM (Identity and Access Management) Is Most Important For Better Cybersecurity \u2013 Blog\" >Why understanding IAM (Identity and Access Management) Is Most Important For Better Cybersecurity \u2013 Blog<\/option><option value=\"Writing Secure Software\" >Writing Secure Software<\/option><option value=\"Writing and Ramblings\" >Writing and Ramblings<\/option><option value=\"Zellic \u2014 Research Blog\" >Zellic \u2014 Research Blog<\/option><option value=\"Zen One\" >Zen One<\/option><option value=\"Zero Trust Data Security Blog - mamori.io\" >Zero Trust Data Security Blog - mamori.io<\/option><option value=\"Zero Trust Security, Remote Access &amp; VPN Alternatives | Cyolo Blog - Cyolo\" >Zero Trust Security, Remote Access &amp; VPN Alternatives | Cyolo Blog - Cyolo<\/option><option value=\"ZeroFox - Feed\" >ZeroFox - Feed<\/option><option value=\"ZeroNorth\" >ZeroNorth<\/option><option value=\"alluresecurity\" >alluresecurity<\/option><option value=\"armoredcode.com - the application security blog that gets the job done\" >armoredcode.com - the application security blog that gets the job done<\/option><option value=\"artofinfosec\" >artofinfosec<\/option><option value=\"aut disce, aut discede\" >aut disce, aut discede<\/option><option value=\"blastwave.com | RSS\" >blastwave.com | RSS<\/option><option value=\"blog.avast.com EN\" >blog.avast.com EN<\/option><option value=\"comforte Blog\" >comforte Blog<\/option><option value=\"comforte Insights\" >comforte Insights<\/option><option value=\"firstinitiallastname\" >firstinitiallastname<\/option><option value=\"https.in Blog\" >https.in Blog<\/option><option value=\"iScan Online Blog\" >iScan Online Blog<\/option><option value=\"idaptive Blog\" >idaptive Blog<\/option><option value=\"iplosion security\" >iplosion security<\/option><option value=\"malicious.link\" >malicious.link<\/option><option value=\"nCipher Security Blog\" >nCipher Security Blog<\/option><option value=\"psilva&#039;s prophecies\" >psilva&#039;s prophecies<\/option><option value=\"psilva&#039;s prophecies\" >psilva&#039;s prophecies<\/option><option value=\"rud.is\" >rud.is<\/option><option value=\"ryanlrussell\" >ryanlrussell<\/option><option value=\"security-boulevard \u2013 ReliaQuest\" >security-boulevard \u2013 ReliaQuest<\/option><option value=\"spylogic.net\" >spylogic.net<\/option><option value=\"sternx technology\" >sternx technology<\/option><option value=\"syndicate \u2013 Astra Security Blog\" >syndicate \u2013 Astra Security Blog<\/option><option value=\"trustedsignal\" >trustedsignal<\/option><option value=\"trustedsignal -- blog\" >trustedsignal -- blog<\/option><option value=\"tssci-security\" >tssci-security<\/option><option value=\"un-excogitate\" >un-excogitate<\/option><option value=\"wirewatcher\" >wirewatcher<\/option><option value=\"www.anitian.com\" >www.anitian.com<\/option><option value=\"www.firemon.com\" >www.firemon.com<\/option><option value=\"| Allot Blog\" >| Allot Blog<\/option><\/select><\/div><div class=\"pt-cv-view pt-cv-collapsible pt-cv-nolf pt-cv-pgregular cvp-lfres\" id=\"pt-cv-view-9982238a4v\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"panel-group\" id=\"2a35dda8vz\"><div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037657\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#1bc664e5pk\" href='https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/' onclick='event.preventDefault()'>\r\n\t\tInterpol, African Nations Arrest 1,006 in Sweeping \u2018Operation Serengeti\u2019<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-27T14:28:48-05:00\">4 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Jeffrey Burt<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"1bc664e5pk\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Interpol led 19 African countries in a massive anti-cybercriminal effort dubbed \"Operation Serengeti\" that shut down a range of scams and attacks that bled $193 million from 35,000 victims. More than 1,000 people were arrested and more than 134,000 malicious infrastructures shut down ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-27T14:28:48-05:00\">4 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/&#038;text=Interpol%2C+African+Nations+Arrest+1%2C006+in+Sweeping+%E2%80%98Operation+Serengeti%E2%80%99\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/interpol-african-nations-arrest-1006-in-sweeping-operation-serengeti\/&#038;title=Interpol%2C+African+Nations+Arrest+1%2C006+in+Sweeping+%E2%80%98Operation+Serengeti%E2%80%99&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037652\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#84b3e2as1c\" href='https:\/\/securityboulevard.com\/2024\/11\/exabeam-allies-with-wiz-to-integrate-cnapp-with-siem-platform\/' onclick='event.preventDefault()'>\r\n\t\tExabeam Allies With Wiz to Integrate CNAPP With SIEM Platform<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-27T08:16:40-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Michael Vizard<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"84b3e2as1c\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Exabeam has allied with Wiz to gain access to security data collected from a cloud-native application protection platform (CNAPP) ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/exabeam-allies-with-wiz-to-integrate-cnapp-with-siem-platform\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-27T08:16:40-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/mike-vizard\/\" rel=\"author\">Michael Vizard<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/exabeam-allies-with-wiz-to-integrate-cnapp-with-siem-platform\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/exabeam-allies-with-wiz-to-integrate-cnapp-with-siem-platform\/&#038;text=Exabeam+Allies+With+Wiz+to+Integrate+CNAPP+With+SIEM+Platform\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/exabeam-allies-with-wiz-to-integrate-cnapp-with-siem-platform\/&#038;title=Exabeam+Allies+With+Wiz+to+Integrate+CNAPP+With+SIEM+Platform&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037649\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#0a42c9dy8p\" href='https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/' onclick='event.preventDefault()'>\r\n\t\tProtecting Web-Based Work: Connecting People, Web Browsers and Security<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-27T03:03:19-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Anupam Upadyaya<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"0a42c9dy8p\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">With web browsers being the primary gateway to the internet, any security lapse can lead to broad opportunities for significant data breaches and operational disruptions ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-27T03:03:19-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/anupam-upadyaya\/\" rel=\"author\">Anupam Upadyaya<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/&#038;text=Protecting+Web-Based+Work%3A+Connecting+People%2C+Web+Browsers+and+Security\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/protecting-web-based-work-connecting-people-web-browsers-and-security\/&#038;title=Protecting+Web-Based+Work%3A+Connecting+People%2C+Web+Browsers+and+Security&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037639\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#496e9ad6ma\" href='https:\/\/securityboulevard.com\/2024\/11\/aws-reinvent-2024-optimize-your-kubernetes-with-fairwinds-and-netapp\/' onclick='event.preventDefault()'>\r\n\t\tAWS re:Invent 2024: Optimize Your Kubernetes with Fairwinds and NetApp<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T16:28:54-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Mary Henry<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"496e9ad6ma\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">AWS re:Invent 2024 is next week, right after a late Thanksgiving when we\u2019re kicking off the last few weeks of a busy year. For many organizations, now is the time to review costs and plan budgets. For many, that means taking a hard look at cloud spend and thinking about how to optimize it. If ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/aws-reinvent-2024-optimize-your-kubernetes-with-fairwinds-and-netapp\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T16:28:54-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/mary-henry\/\" rel=\"author\">Mary Henry<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Fairwinds | Blog&feed_id=905&blog_url=https:\/\/www.fairwinds.com\/blog\">Fairwinds | Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/aws-reinvent-2024-optimize-your-kubernetes-with-fairwinds-and-netapp\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/aws-reinvent-2024-optimize-your-kubernetes-with-fairwinds-and-netapp\/&#038;text=AWS+re%3AInvent+2024%3A+Optimize+Your+Kubernetes+with+Fairwinds+and+NetApp\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/aws-reinvent-2024-optimize-your-kubernetes-with-fairwinds-and-netapp\/&#038;title=AWS+re%3AInvent+2024%3A+Optimize+Your+Kubernetes+with+Fairwinds+and+NetApp&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037633\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#42aea42ygl\" href='https:\/\/securityboulevard.com\/2024\/11\/key-takeaways-from-the-latest-dod-enterprise-devsecops-fundamentals-update\/' onclick='event.preventDefault()'>\r\n\t\tKey takeaways from the latest DoD Enterprise DevSecOps Fundamentals update<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T16:15:53-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Daniel Glick<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"42aea42ygl\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">As the cybersecurity landscape changes and threats evolve, the Department of Defense (DoD) has updated its Enterprise DevSecOps Fundamentals to align development practices with security imperatives further. This is part of a long-term effort by the DoD to improve how software is developed, deployed, and managed across its network, including its business systems, weapons systems, ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/key-takeaways-from-the-latest-dod-enterprise-devsecops-fundamentals-update\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T16:15:53-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/daniel-glick\/\" rel=\"author\">Daniel Glick<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=2024 Sonatype Blog&feed_id=644&blog_url=https:\/\/www.sonatype.com\/blog\">2024 Sonatype Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/key-takeaways-from-the-latest-dod-enterprise-devsecops-fundamentals-update\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/key-takeaways-from-the-latest-dod-enterprise-devsecops-fundamentals-update\/&#038;text=Key+takeaways+from+the+latest+DoD+Enterprise+DevSecOps+Fundamentals+update\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/key-takeaways-from-the-latest-dod-enterprise-devsecops-fundamentals-update\/&#038;title=Key+takeaways+from+the+latest+DoD+Enterprise+DevSecOps+Fundamentals+update&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037629\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#c45d993aeo\" href='https:\/\/securityboulevard.com\/2024\/11\/def-con-32-behind-enemy-lines-engaging-and-disrupting-ransomware-web-panel\/' onclick='event.preventDefault()'>\r\n\t\tDEF CON 32 &#8211;  Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panel<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T15:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Marc Handelman<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"c45d993aeo\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Authors\/Presenters: Vangelis Stykas Our sincere appreciation to DEF CON, and the Presenters\/Authors for publishing their erudite DEF CON 32 content. Originating from the conference\u2019s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/def-con-32-behind-enemy-lines-engaging-and-disrupting-ransomware-web-panel\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T15:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/marc-handelman\/\" rel=\"author\">Marc Handelman<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Infosecurity.US&feed_id=440&blog_url=https:\/\/www.infosecurity.us\/\">Infosecurity.US<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-behind-enemy-lines-engaging-and-disrupting-ransomware-web-panel\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-behind-enemy-lines-engaging-and-disrupting-ransomware-web-panel\/&#038;text=DEF+CON+32+%26%238211%3B++Behind+Enemy+Lines%3A+Engaging+and+Disrupting+Ransomware+Web+Panel\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-behind-enemy-lines-engaging-and-disrupting-ransomware-web-panel\/&#038;title=DEF+CON+32+%26%238211%3B++Behind+Enemy+Lines%3A+Engaging+and+Disrupting+Ransomware+Web+Panel&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037620\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#29743aa3lj\" href='https:\/\/securityboulevard.com\/2024\/11\/randall-munroes-xkcd-d-combinatorics\/' onclick='event.preventDefault()'>\r\n\t\tRandall Munroe\u2019s XKCD \u2018D Combinatorics\u2019<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T13:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Marc Handelman<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"29743aa3lj\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">via the comic humor &amp; dry wit of Randall Munroe, creator of XKCD Permalink ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/randall-munroes-xkcd-d-combinatorics\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T13:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/marc-handelman\/\" rel=\"author\">Marc Handelman<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Infosecurity.US&feed_id=440&blog_url=https:\/\/www.infosecurity.us\/\">Infosecurity.US<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/randall-munroes-xkcd-d-combinatorics\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/randall-munroes-xkcd-d-combinatorics\/&#038;text=Randall+Munroe%E2%80%99s+XKCD+%E2%80%98D+Combinatorics%E2%80%99\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/randall-munroes-xkcd-d-combinatorics\/&#038;title=Randall+Munroe%E2%80%99s+XKCD+%E2%80%98D+Combinatorics%E2%80%99&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037637\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#2d994bdukz\" href='https:\/\/securityboulevard.com\/2024\/11\/why-you-should-stay-professionally-detached-from-the-vulns-you-find\/' onclick='event.preventDefault()'>\r\n\t\tWhy you should stay \u201cprofessionally detached\u201d from the vulns you find<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T12:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Dana Epp<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"2d994bdukz\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Learn how to stay professionally detached from the vulnerabilities you discover and disclose as part of your security research. The post Why you should stay \u201cprofessionally detached\u201d from the vulns you find appeared first on Dana Epp's Blog ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/why-you-should-stay-professionally-detached-from-the-vulns-you-find\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T12:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/dana-epp\/\" rel=\"author\">Dana Epp<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Dana Epp&#039;s Blog&feed_id=917&blog_url=https:\/\/danaepp.com\/\">Dana Epp&#039;s Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/why-you-should-stay-professionally-detached-from-the-vulns-you-find\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/why-you-should-stay-professionally-detached-from-the-vulns-you-find\/&#038;text=Why+you+should+stay+%E2%80%9Cprofessionally+detached%E2%80%9D+from+the+vulns+you+find\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/why-you-should-stay-professionally-detached-from-the-vulns-you-find\/&#038;title=Why+you+should+stay+%E2%80%9Cprofessionally+detached%E2%80%9D+from+the+vulns+you+find&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037622\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#58063c4s42\" href='https:\/\/securityboulevard.com\/2024\/11\/def-con-32-the-rise-and-fall-of-binary-exploitation\/' onclick='event.preventDefault()'>\r\n\t\tDEF CON 32 &#8211; The Rise and Fall of Binary Exploitation<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T11:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Marc Handelman<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"58063c4s42\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Authors\/Presenters: Stephen Sims Our sincere appreciation to DEF CON, and the Presenters\/Authors for publishing their erudite DEF CON 32 content. Originating from the conference\u2019s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/def-con-32-the-rise-and-fall-of-binary-exploitation\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T11:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/marc-handelman\/\" rel=\"author\">Marc Handelman<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Infosecurity.US&feed_id=440&blog_url=https:\/\/www.infosecurity.us\/\">Infosecurity.US<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-the-rise-and-fall-of-binary-exploitation\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-the-rise-and-fall-of-binary-exploitation\/&#038;text=DEF+CON+32+%26%238211%3B+The+Rise+and+Fall+of+Binary+Exploitation\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-the-rise-and-fall-of-binary-exploitation\/&#038;title=DEF+CON+32+%26%238211%3B+The+Rise+and+Fall+of+Binary+Exploitation&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037607\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#4763bffm2o\" href='https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/' onclick='event.preventDefault()'>\r\n\t\tSupply Chain Ransomware Attack Hits Starbucks, UK Grocers<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:37:56-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Jeffrey Burt<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"4763bffm2o\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Coffee store giant Starbucks was among other organizations affected by a ransomware attack this month on cloud managed service provider Blue Yonder, a Panasonic subsidiary that has more than 3,000 customers. Two UK grocery chains also were impacted ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:37:56-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/&#038;text=Supply+Chain+Ransomware+Attack+Hits+Starbucks%2C+UK+Grocers\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/supply-chain-ransomware-attack-hits-starbucks-uk-grocers\/&#038;title=Supply+Chain+Ransomware+Attack+Hits+Starbucks%2C+UK+Grocers&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037631\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#3b301d0z0k\" href='https:\/\/securityboulevard.com\/2024\/11\/the-elephant-in-appsec-talks-highlight-shifting-left-doesnt-mean-anything-anymore\/' onclick='event.preventDefault()'>\r\n\t\tThe Elephant in AppSec Talks Highlight: Shifting Left Doesn&#8217;t Mean Anything Anymore<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:24:43-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Sanjana Iyer<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"3b301d0z0k\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Discover key highlights from Tanya Janca's talk at The Elephant in AppSec Conference on shifting security to be present throughout the entire Software Development Lifecycle ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-elephant-in-appsec-talks-highlight-shifting-left-doesnt-mean-anything-anymore\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:24:43-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/sanjana-iyer\/\" rel=\"author\">Sanjana Iyer<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Escape - The API Security Blog&feed_id=1020&blog_url=https:\/\/escape.tech\/blog\/\">Escape - The API Security Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/the-elephant-in-appsec-talks-highlight-shifting-left-doesnt-mean-anything-anymore\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/the-elephant-in-appsec-talks-highlight-shifting-left-doesnt-mean-anything-anymore\/&#038;text=The+Elephant+in+AppSec+Talks+Highlight%3A+Shifting+Left+Doesn%26%238217%3Bt+Mean+Anything+Anymore\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/the-elephant-in-appsec-talks-highlight-shifting-left-doesnt-mean-anything-anymore\/&#038;title=The+Elephant+in+AppSec+Talks+Highlight%3A+Shifting+Left+Doesn%26%238217%3Bt+Mean+Anything+Anymore&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037624\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#2daaabef7n\" href='https:\/\/securityboulevard.com\/2024\/11\/secure-workload-access-in-minutes-with-aembits-new-quickstart-guide\/' onclick='event.preventDefault()'>\r\n\t\tSecure Workload Access in Minutes with Aembit\u2019s New QuickStart Guide<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:23:02-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Kevin Sapp<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"2daaabef7n\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">3 min readThis step-by-step resource helps you deploy workloads, configure policies, and explore Aembit\u2019s approach to securing non-human identities. The post Secure Workload Access in Minutes with Aembit\u2019s New QuickStart Guide appeared first on Aembit ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/secure-workload-access-in-minutes-with-aembits-new-quickstart-guide\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:23:02-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/kevin-sapp\/\" rel=\"author\">Kevin Sapp<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Aembit&feed_id=1038&blog_url=https:\/\/aembit.io\/\">Aembit<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/secure-workload-access-in-minutes-with-aembits-new-quickstart-guide\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/secure-workload-access-in-minutes-with-aembits-new-quickstart-guide\/&#038;text=Secure+Workload+Access+in+Minutes+with+Aembit%E2%80%99s+New+QuickStart+Guide\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/secure-workload-access-in-minutes-with-aembits-new-quickstart-guide\/&#038;title=Secure+Workload+Access+in+Minutes+with+Aembit%E2%80%99s+New+QuickStart+Guide&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037597\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#9a96ecb8mg\" href='https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/' onclick='event.preventDefault()'>\r\n\t\tQNAP\u2019s Buggy Security Fix Causes Chaos<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Richi Jennings<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"9a96ecb8mg\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">RAID FAIL: NAS Maker does a CrowdStrike\u2014cleanup on \/dev\/dsk\/c1t2d3s4 please ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/&#038;text=QNAP%E2%80%99s+Buggy+Security+Fix+Causes+Chaos\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/&#038;title=QNAP%E2%80%99s+Buggy+Security+Fix+Causes+Chaos&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037614\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#7f0fad0pcx\" href='https:\/\/securityboulevard.com\/2024\/11\/how-proactive-security-could-have-stopped-the-summit-pathology-data-breach\/' onclick='event.preventDefault()'>\r\n\t\tHow Proactive Security Could Have Stopped the Summit Pathology Data Breach<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Votiro<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"7f0fad0pcx\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">The post How Proactive Security Could Have Stopped the Summit Pathology Data Breach appeared first on Votiro ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/how-proactive-security-could-have-stopped-the-summit-pathology-data-breach\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:00:00-05:00\">5 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/votiro\/\" rel=\"author\">Votiro<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Votiro&feed_id=713&blog_url=https:\/\/votiro.com\/\">Votiro<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/how-proactive-security-could-have-stopped-the-summit-pathology-data-breach\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/how-proactive-security-could-have-stopped-the-summit-pathology-data-breach\/&#038;text=How+Proactive+Security+Could+Have+Stopped+the+Summit+Pathology+Data+Breach\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/how-proactive-security-could-have-stopped-the-summit-pathology-data-breach\/&#038;title=How+Proactive+Security+Could+Have+Stopped+the+Summit+Pathology+Data+Breach&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037609\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#6d17c274vy\" href='https:\/\/securityboulevard.com\/2024\/11\/november-product-update-2\/' onclick='event.preventDefault()'>\r\n\t\tNovember Product Update<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T06:00:00-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> CyberSaint Customer Success<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"6d17c274vy\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">The CyberSaint team has been working hard to deliver the latest updates to streamline and improve our customers\u2019 user experience and address their top-of-mind challenges. We\u2019re thrilled to announce the latest additions and updates to the CyberStrong solution, which includes an entirely new navigation experience, a new Home Page, Hierarchical Role-Based Controls, and Custom Risk ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/november-product-update-2\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T06:00:00-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/cybersaint-customer-success\/\" rel=\"author\">CyberSaint Customer Success<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=CyberSaint Blog&feed_id=600&blog_url=https:\/\/www.cybersaint.io\/blog\">CyberSaint Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/november-product-update-2\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/november-product-update-2\/&#038;text=November+Product+Update\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/november-product-update-2\/&#038;title=November+Product+Update&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037618\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#592ebb46y0\" href='https:\/\/securityboulevard.com\/2024\/11\/a-cisos-guide-to-bot-protection-effectiveness-breaking-open-the-black-box\/' onclick='event.preventDefault()'>\r\n\t\tA CISO\u2019s Guide to Bot Protection Effectiveness \u2013 Breaking Open the Black Box<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T03:00:42-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Nick Rieniets<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"592ebb46y0\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Learn how to validate bot protection effectiveness, mitigate business risks, and ensure your defenses align with operational and regulatory needs ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/a-cisos-guide-to-bot-protection-effectiveness-breaking-open-the-black-box\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T03:00:42-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/nick-rieniets\/\" rel=\"author\">Nick Rieniets<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Kasada&feed_id=728&blog_url=https:\/\/www.kasada.io\">Kasada<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/a-cisos-guide-to-bot-protection-effectiveness-breaking-open-the-black-box\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/a-cisos-guide-to-bot-protection-effectiveness-breaking-open-the-black-box\/&#038;text=A+CISO%E2%80%99s+Guide+to+Bot+Protection+Effectiveness+%E2%80%93+Breaking+Open+the+Black+Box\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/a-cisos-guide-to-bot-protection-effectiveness-breaking-open-the-black-box\/&#038;title=A+CISO%E2%80%99s+Guide+to+Bot+Protection+Effectiveness+%E2%80%93+Breaking+Open+the+Black+Box&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037641\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#f10947bfrt\" href='https:\/\/securityboulevard.com\/2024\/11\/spf-flattening-what-is-it-and-why-do-you-need-it\/' onclick='event.preventDefault()'>\r\n\t\tSPF flattening: What is it and why do you need it?<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T02:34:16-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Yunes Tarada<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"f10947bfrt\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">SPF flattening is a technique used to optimize and simplify Sender Policy Framework (SPF) records by reducing the number of DNS lookups ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/spf-flattening-what-is-it-and-why-do-you-need-it\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T02:34:16-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/yunes-tarada\/\" rel=\"author\">Yunes Tarada<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=PowerDMARC&feed_id=994&blog_url=https:\/\/powerdmarc.com\">PowerDMARC<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/spf-flattening-what-is-it-and-why-do-you-need-it\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/spf-flattening-what-is-it-and-why-do-you-need-it\/&#038;text=SPF+flattening%3A+What+is+it+and+why+do+you+need+it%3F\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/spf-flattening-what-is-it-and-why-do-you-need-it\/&#038;title=SPF+flattening%3A+What+is+it+and+why+do+you+need+it%3F&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037626\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#9003158sev\" href='https:\/\/securityboulevard.com\/2024\/11\/affect-of-seo-poisoning-in-organizations-and-how-to-prevent-it\/' onclick='event.preventDefault()'>\r\n\t\tAffect of SEO Poisoning in Organizations and How to Prevent It?<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T01:15:22-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Puja Saikia<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"9003158sev\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">In today\u2019s digital world, online visibility is crucial for business success. SEO Poisoning has emerged as a harmful attack method in the hands of threat actors. It exploits the very system designed to connect businesses with their customers \u2013 \u2018search engines\u2019. The constant attack on the healthcare and public health sector in the USA has ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/affect-of-seo-poisoning-in-organizations-and-how-to-prevent-it\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-26T01:15:22-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/puja-saikia\/\" rel=\"author\">Puja Saikia<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Kratikal Blogs&feed_id=727&blog_url=https:\/\/kratikal.com\/blog\/\">Kratikal Blogs<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/affect-of-seo-poisoning-in-organizations-and-how-to-prevent-it\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/affect-of-seo-poisoning-in-organizations-and-how-to-prevent-it\/&#038;text=Affect+of+SEO+Poisoning+in+Organizations+and+How+to+Prevent+It%3F\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/affect-of-seo-poisoning-in-organizations-and-how-to-prevent-it\/&#038;title=Affect+of+SEO+Poisoning+in+Organizations+and+How+to+Prevent+It%3F&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037585\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#f029c28tcn\" href='https:\/\/securityboulevard.com\/2024\/11\/rf-fortune-telling-frequency-hopping-predictability\/' onclick='event.preventDefault()'>\r\n\t\tRF Fortune Telling: Frequency Hopping Predictability<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T21:18:03-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Harry Hayward<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"f029c28tcn\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">In the world of wireless communications, security vulnerabilities in implemented protocols canremain hidden behind layers of complexity. What appears secure due to the intricate nature ofRF communications may harbor fundamental weaknesses. Let\u2019s dive into a fascinating casethat reveals how a seemingly minor cryptographic weakness in frequency hopping algorithmscan compromise an entire wireless communication stream. Understanding ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/rf-fortune-telling-frequency-hopping-predictability\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T21:18:03-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/harry-hayward\/\" rel=\"author\">Harry Hayward<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Security Blog | Praetorian&feed_id=854&blog_url=https:\/\/www.praetorian.com\/blog\/\">Security Blog | Praetorian<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/rf-fortune-telling-frequency-hopping-predictability\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/rf-fortune-telling-frequency-hopping-predictability\/&#038;text=RF+Fortune+Telling%3A+Frequency+Hopping+Predictability\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/rf-fortune-telling-frequency-hopping-predictability\/&#038;title=RF+Fortune+Telling%3A+Frequency+Hopping+Predictability&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037581\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#e0eae59pwq\" href='https:\/\/securityboulevard.com\/2024\/11\/11-tips-to-streamline-your-data-center-operations-with-dcim-software\/' onclick='event.preventDefault()'>\r\n\t\t11 Tips to Streamline Your Data Center Operations with DCIM Software<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T20:09:44-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Rajan Sodhi<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"e0eae59pwq\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Managing a data center is a complex task, requiring seamless coordination of resources, equipment, and personnel. Modern Data Center Infrastructure Management (DCIM) software has become a cornerstone for optimizing operations, offering comprehensive solutions for monitoring, managing, and improving data center performance. Here are 11 tips to help you streamline your data center operations using DCIM ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/11-tips-to-streamline-your-data-center-operations-with-dcim-software\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T20:09:44-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/rajan-sodhi\/\" rel=\"author\">Rajan Sodhi<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Hyperview&feed_id=910&blog_url=https:\/\/www.hyperviewhq.com\/\">Hyperview<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/11-tips-to-streamline-your-data-center-operations-with-dcim-software\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/11-tips-to-streamline-your-data-center-operations-with-dcim-software\/&#038;text=11+Tips+to+Streamline+Your+Data+Center+Operations+with+DCIM+Software\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/11-tips-to-streamline-your-data-center-operations-with-dcim-software\/&#038;title=11+Tips+to+Streamline+Your+Data+Center+Operations+with+DCIM+Software&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037559\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#7e63e34cjl\" href='https:\/\/securityboulevard.com\/2024\/11\/understanding-the-nydfs-cybersecurity-regulation\/' onclick='event.preventDefault()'>\r\n\t\tUnderstanding the NYDFS Cybersecurity Regulation<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:57:44-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Legit Security<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"7e63e34cjl\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Whether you're a small financial service provider or a major institution, if you\u2019re doing business in the state of New York, you need to meet New York Department of Financial Services (NYDFS) regulations. Formerly known as 23 NYCRR 500, these standards ensure the security and resilience of technology-driven financial systems. Understanding them is crucial for ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/understanding-the-nydfs-cybersecurity-regulation\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:57:44-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/legit-security\/\" rel=\"author\">Legit Security<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/understanding-the-nydfs-cybersecurity-regulation\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/understanding-the-nydfs-cybersecurity-regulation\/&#038;text=Understanding+the+NYDFS+Cybersecurity+Regulation\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/understanding-the-nydfs-cybersecurity-regulation\/&#038;title=Understanding+the+NYDFS+Cybersecurity+Regulation&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037561\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#cda44fdlot\" href='https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/' onclick='event.preventDefault()'>\r\n\t\tCMMC Compliance Requirements: A Complete Guide<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:56:55-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Legit Security<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"cda44fdlot\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Department of Defense (DoD) data is some of the most sensitive out there. That\u2019s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures to protect controlled information.\u00a0 ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:56:55-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/legit-security\/\" rel=\"author\">Legit Security<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/&#038;text=CMMC+Compliance+Requirements%3A+A+Complete+Guide\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/&#038;title=CMMC+Compliance+Requirements%3A+A+Complete+Guide&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037563\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#d68bd45oqt\" href='https:\/\/securityboulevard.com\/2024\/11\/what-is-ci-cd-security-risks-and-best-practices\/' onclick='event.preventDefault()'>\r\n\t\tWhat Is CI\/CD Security? Risks and Best Practices<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:23:24-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Legit Security<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"d68bd45oqt\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Continuous integration and continuous delivery (CI\/CD) pipelines are invaluable in software development. They expedite the deployment process and maintain teams at the forefront of innovation. But with these benefits come unique security challenges that can leave critical systems vulnerable ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/what-is-ci-cd-security-risks-and-best-practices\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:23:24-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/legit-security\/\" rel=\"author\">Legit Security<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/what-is-ci-cd-security-risks-and-best-practices\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/what-is-ci-cd-security-risks-and-best-practices\/&#038;text=What+Is+CI%2FCD+Security%3F+Risks+and+Best+Practices\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/what-is-ci-cd-security-risks-and-best-practices\/&#038;title=What+Is+CI%2FCD+Security%3F+Risks+and+Best+Practices&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037583\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#ddef38fm1l\" href='https:\/\/securityboulevard.com\/2024\/11\/life-in-the-swimlane-with-dylan-dartnell-professional-services-engineer\/' onclick='event.preventDefault()'>\r\n\t\tLife in the Swimlane with Dylan Dartnell, Professional Services Engineer<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:09:23-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Maycie Belmore<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"ddef38fm1l\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">The post Life in the Swimlane with Dylan Dartnell, Professional Services Engineer appeared first on AI-Enhanced Security Automation ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/life-in-the-swimlane-with-dylan-dartnell-professional-services-engineer\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:09:23-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/maycie-belmore\/\" rel=\"author\">Maycie Belmore<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Blog Archives - AI-Enhanced Security Automation&feed_id=587&blog_url=https:\/\/swimlane.com\/resource-type\/blogs\/\">Blog Archives - AI-Enhanced Security Automation<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/life-in-the-swimlane-with-dylan-dartnell-professional-services-engineer\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/life-in-the-swimlane-with-dylan-dartnell-professional-services-engineer\/&#038;text=Life+in+the+Swimlane+with+Dylan+Dartnell%2C+Professional+Services+Engineer\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/life-in-the-swimlane-with-dylan-dartnell-professional-services-engineer\/&#038;title=Life+in+the+Swimlane+with+Dylan+Dartnell%2C+Professional+Services+Engineer&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037567\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#9e904fau6i\" href='https:\/\/securityboulevard.com\/2024\/11\/def-con-32-from-getting-jtag-on-the-iphone-15-to-hacking-apples-usb-c-controller\/' onclick='event.preventDefault()'>\r\n\t\tDEF CON 32 &#8211;  From Getting JTAG On The iPhone 15 To Hacking Apple&#8217;s USB-C Controller<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T15:00:00-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Marc Handelman<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"9e904fau6i\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Authors\/Presenters: Stacksmashing Our sincere appreciation to DEF CON, and the Presenters\/Authors for publishing their erudite DEF CON 32 content. Originating from the conference\u2019s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/def-con-32-from-getting-jtag-on-the-iphone-15-to-hacking-apples-usb-c-controller\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T15:00:00-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/marc-handelman\/\" rel=\"author\">Marc Handelman<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Infosecurity.US&feed_id=145&blog_url=https:\/\/www.infosecurity.us\/\">Infosecurity.US<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-from-getting-jtag-on-the-iphone-15-to-hacking-apples-usb-c-controller\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-from-getting-jtag-on-the-iphone-15-to-hacking-apples-usb-c-controller\/&#038;text=DEF+CON+32+%26%238211%3B++From+Getting+JTAG+On+The+iPhone+15+To+Hacking+Apple%26%238217%3Bs+USB-C+Controller\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-from-getting-jtag-on-the-iphone-15-to-hacking-apples-usb-c-controller\/&#038;title=DEF+CON+32+%26%238211%3B++From+Getting+JTAG+On+The+iPhone+15+To+Hacking+Apple%26%238217%3Bs+USB-C+Controller&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037587\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#a2849d1r24\" href='https:\/\/securityboulevard.com\/2024\/11\/you-have-less-than-two-months-to-become-dora-compliant\/' onclick='event.preventDefault()'>\r\n\t\tYou Have Less Than Two Months to Become DORA Compliant<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T14:14:29-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Azul<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"a2849d1r24\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">You have less than two months to become DORA compliant if your company is based in the EU or does business in the EU. The post You Have Less Than Two Months to Become DORA Compliant appeared first on Azul | Better Java Performance, Superior Java Support ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/you-have-less-than-two-months-to-become-dora-compliant\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T14:14:29-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/azul\/\" rel=\"author\">Azul<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Security Blog Posts - Azul&feed_id=933&blog_url=https:\/\/www.azul.com\/category\/security\/\">Security Blog Posts - Azul<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/you-have-less-than-two-months-to-become-dora-compliant\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/you-have-less-than-two-months-to-become-dora-compliant\/&#038;text=You+Have+Less+Than+Two+Months+to+Become+DORA+Compliant\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/you-have-less-than-two-months-to-become-dora-compliant\/&#038;title=You+Have+Less+Than+Two+Months+to+Become+DORA+Compliant&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037575\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#87e5ddf4b5\" href='https:\/\/securityboulevard.com\/2024\/11\/5-traditional-approaches-to-generating-test-data\/' onclick='event.preventDefault()'>\r\n\t\t5 Traditional Approaches to Generating Test Data<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T14:05:36-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Expert Insights on Synthetic Data from the Tonic.ai Blog<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"87e5ddf4b5\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">We\u2019ll discuss five of the most common methods used to date to generate data and how they stack up for use in testing and development ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/5-traditional-approaches-to-generating-test-data\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T14:05:36-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/expert-insights-on-synthetic-data-from-the-tonic-a\/\" rel=\"author\">Expert Insights on Synthetic Data from the Tonic.ai Blog<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Expert Insights on Synthetic Data from the Tonic.ai Blog&feed_id=1060&blog_url=https:\/\/www.tonic.ai\">Expert Insights on Synthetic Data from the Tonic.ai Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/5-traditional-approaches-to-generating-test-data\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/5-traditional-approaches-to-generating-test-data\/&#038;text=5+Traditional+Approaches+to+Generating+Test+Data\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/5-traditional-approaches-to-generating-test-data\/&#038;title=5+Traditional+Approaches+to+Generating+Test+Data&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037547\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#f9f4120vh4\" href='https:\/\/securityboulevard.com\/2024\/11\/machine-learning-in-cyber-security-harnessing-the-power-of-five-ai-tribes\/' onclick='event.preventDefault()'>\r\n\t\tMachine Learning in Cyber Security: Harnessing the Power of Five AI Tribes<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T13:02:08-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Shriram Sharma<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"f9f4120vh4\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Learn about the five key machine learning approaches outlined in the best selling AI book, The Master Algorithm, and their use cases in the field of cybersecurity. The post Machine Learning in Cyber Security: Harnessing the Power of Five AI Tribes appeared first on D3 Security ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/machine-learning-in-cyber-security-harnessing-the-power-of-five-ai-tribes\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T13:02:08-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/shriram-sharma\/\" rel=\"author\">Shriram Sharma<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=D3 Security&feed_id=1011&blog_url=https:\/\/d3security.com\/\">D3 Security<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/machine-learning-in-cyber-security-harnessing-the-power-of-five-ai-tribes\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/machine-learning-in-cyber-security-harnessing-the-power-of-five-ai-tribes\/&#038;text=Machine+Learning+in+Cyber+Security%3A+Harnessing+the+Power+of+Five+AI+Tribes\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/machine-learning-in-cyber-security-harnessing-the-power-of-five-ai-tribes\/&#038;title=Machine+Learning+in+Cyber+Security%3A+Harnessing+the+Power+of+Five+AI+Tribes&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037536\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#0bd5645lkm\" href='https:\/\/securityboulevard.com\/2024\/11\/randall-munroes-xkcd-arizona-chess\/' onclick='event.preventDefault()'>\r\n\t\tRandall Munroe\u2019s XKCD \u2018Arizona Chess\u2019<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T13:00:00-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Marc Handelman<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"0bd5645lkm\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">via the comic humor &amp; dry wit of Randall Munroe, creator of XKCD Permalink ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/randall-munroes-xkcd-arizona-chess\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T13:00:00-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/marc-handelman\/\" rel=\"author\">Marc Handelman<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Infosecurity.US&feed_id=440&blog_url=https:\/\/www.infosecurity.us\/\">Infosecurity.US<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/randall-munroes-xkcd-arizona-chess\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/randall-munroes-xkcd-arizona-chess\/&#038;text=Randall+Munroe%E2%80%99s+XKCD+%E2%80%98Arizona+Chess%E2%80%99\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/randall-munroes-xkcd-arizona-chess\/&#038;title=Randall+Munroe%E2%80%99s+XKCD+%E2%80%98Arizona+Chess%E2%80%99&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037593\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#f2a6f84c8f\" href='https:\/\/securityboulevard.com\/2024\/11\/top-cmmc-questions-from-2500-dib-companies-answered\/' onclick='event.preventDefault()'>\r\n\t\tTop CMMC Questions from 2,500 DIB Companies- Answered<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T12:25:17-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Orlee Berlove, reviewed by No\u00ebl Vestal, PMP, CMMC RP<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"f2a6f84c8f\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">When 2,500 defense contractors gathered at our recent CMMC Summit, they asked hundreds of questions about identifying CUI, scoping CMMC, documentation, their Primes, and assessments.\u00a0 Here are their 15 most common questions, answered by our compliance experts: Questions on Scoping &amp; Boundaries Q: \u201cFor organizations with multiple locations, how should CMMC be scoped when only ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/top-cmmc-questions-from-2500-dib-companies-answered\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T12:25:17-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/orlee-berlove-reviewed-by-noel-vestal-pmp-cmmc-rp\/\" rel=\"author\">Orlee Berlove, reviewed by No\u00ebl Vestal, PMP, CMMC RP<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Blog Archive - PreVeil&feed_id=622&blog_url=https:\/\/www.preveil.com\/blog\/\">Blog Archive - PreVeil<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/top-cmmc-questions-from-2500-dib-companies-answered\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/top-cmmc-questions-from-2500-dib-companies-answered\/&#038;text=Top+CMMC+Questions+from+2%2C500+DIB+Companies-+Answered\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/top-cmmc-questions-from-2500-dib-companies-answered\/&#038;title=Top+CMMC+Questions+from+2%2C500+DIB+Companies-+Answered&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037571\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#06545fej8k\" href='https:\/\/securityboulevard.com\/2024\/11\/the-quest-to-minimize-false-positives-reaches-another-significant-milestone\/' onclick='event.preventDefault()'>\r\n\t\tThe Quest to Minimize False Positives Reaches Another Significant Milestone<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T12:09:54-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Guardians<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"06545fej8k\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Our breakthrough ML model FP Remover V2 slashes false positives by 80%, setting a new industry standard for secrets detection. Discover how we're helping security teams focus on real threats instead of chasing phantom alerts ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-quest-to-minimize-false-positives-reaches-another-significant-milestone\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T12:09:54-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/guardians\/\" rel=\"author\">Guardians<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=GitGuardian Blog - Take Control of Your Secrets Security&feed_id=881&blog_url=https:\/\/blog.gitguardian.com\/\">GitGuardian Blog - Take Control of Your Secrets Security<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/the-quest-to-minimize-false-positives-reaches-another-significant-milestone\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/the-quest-to-minimize-false-positives-reaches-another-significant-milestone\/&#038;text=The+Quest+to+Minimize+False+Positives+Reaches+Another+Significant+Milestone\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/the-quest-to-minimize-false-positives-reaches-another-significant-milestone\/&#038;title=The+Quest+to+Minimize+False+Positives+Reaches+Another+Significant+Milestone&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037573\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#81bed36jpq\" href='https:\/\/securityboulevard.com\/2024\/11\/continuous-compliance-monitoring-why-is-it-so-important\/' onclick='event.preventDefault()'>\r\n\t\tContinuous Compliance Monitoring: Why Is It So Important?<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T11:49:29-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> FireMon<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"81bed36jpq\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Compliance monitoring is vital to ensure organizations maintain adherence to regulatory standards and internal policies in real time, helping avoid data breaches, legal penalties, and reputational harm. Regulations are constantly ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/continuous-compliance-monitoring-why-is-it-so-important\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T11:49:29-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/firemon\/\" rel=\"author\">FireMon<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=www.firemon.com&feed_id=661&blog_url=https:\/\/www.firemon.com\">www.firemon.com<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/continuous-compliance-monitoring-why-is-it-so-important\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/continuous-compliance-monitoring-why-is-it-so-important\/&#038;text=Continuous+Compliance+Monitoring%3A+Why+Is+It+So+Important%3F\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/continuous-compliance-monitoring-why-is-it-so-important\/&#038;title=Continuous+Compliance+Monitoring%3A+Why+Is+It+So+Important%3F&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037520\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#5e435afebu\" href='https:\/\/securityboulevard.com\/2024\/11\/privileged-account-security-in-active-directory\/' onclick='event.preventDefault()'>\r\n\t\tPrivileged Account Security in Active Directory<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T11:01:03-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Enzoic<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"5e435afebu\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Privileged accounts in Active Directory (AD) are the keys to your organization\u2019s most sensitive systems, data, and administrative tools. These accounts play an essential role in managing access and keeping things running smoothly, but they also come with significant security risks if not properly managed. Why Privileged Account Security in Active Directory Matters Access to ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/privileged-account-security-in-active-directory\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T11:01:03-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/enzoic\/\" rel=\"author\">Enzoic<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Blog | Enzoic&feed_id=548&blog_url=https:\/\/www.enzoic.com\/blog\/\">Blog | Enzoic<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/privileged-account-security-in-active-directory\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/privileged-account-security-in-active-directory\/&#038;text=Privileged+Account+Security+in+Active+Directory\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/privileged-account-security-in-active-directory\/&#038;title=Privileged+Account+Security+in+Active+Directory&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037538\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#0a921f6lj8\" href='https:\/\/securityboulevard.com\/2024\/11\/def-con-32-behind-enemy-lines-going-undercover-to-breach-lockbit-ransomware-op\/' onclick='event.preventDefault()'>\r\n\t\tDEF CON 32 &#8211;  Behind Enemy Lines: Going Undercover To Breach LockBit Ransomware Op<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T11:00:00-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Marc Handelman<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"0a921f6lj8\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Authors\/Presenters: Jon DiMaggio Our sincere appreciation to DEF CON, and the Presenters\/Authors for publishing their erudite DEF CON 32 content. Originating from the conference\u2019s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/def-con-32-behind-enemy-lines-going-undercover-to-breach-lockbit-ransomware-op\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T11:00:00-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/marc-handelman\/\" rel=\"author\">Marc Handelman<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Infosecurity.US&feed_id=440&blog_url=https:\/\/www.infosecurity.us\/\">Infosecurity.US<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-behind-enemy-lines-going-undercover-to-breach-lockbit-ransomware-op\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-behind-enemy-lines-going-undercover-to-breach-lockbit-ransomware-op\/&#038;text=DEF+CON+32+%26%238211%3B++Behind+Enemy+Lines%3A+Going+Undercover+To+Breach+LockBit+Ransomware+Op\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/def-con-32-behind-enemy-lines-going-undercover-to-breach-lockbit-ransomware-op\/&#038;title=DEF+CON+32+%26%238211%3B++Behind+Enemy+Lines%3A+Going+Undercover+To+Breach+LockBit+Ransomware+Op&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037557\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#9bd9101lje\" href='https:\/\/securityboulevard.com\/2024\/11\/owasp-top-10-for-llm-adds-risks-get-on-target-to-secure-your-ai-models\/' onclick='event.preventDefault()'>\r\n\t\tOWASP Top 10 for LLM adds risks: Get on target to secure your AI models<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:35:27-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> John P. Mello Jr.<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"9bd9101lje\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\"> ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/owasp-top-10-for-llm-adds-risks-get-on-target-to-secure-your-ai-models\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:35:27-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/john-p-mello-jr\/\" rel=\"author\">John P. Mello Jr.<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=ReversingLabs Blog&feed_id=888&blog_url=https:\/\/www.reversinglabs.com\/blog\">ReversingLabs Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/owasp-top-10-for-llm-adds-risks-get-on-target-to-secure-your-ai-models\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/owasp-top-10-for-llm-adds-risks-get-on-target-to-secure-your-ai-models\/&#038;text=OWASP+Top+10+for+LLM+adds+risks%3A+Get+on+target+to+secure+your+AI+models\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/owasp-top-10-for-llm-adds-risks-get-on-target-to-secure-your-ai-models\/&#038;title=OWASP+Top+10+for+LLM+adds+risks%3A+Get+on+target+to+secure+your+AI+models&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037565\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#d4d3701t3q\" href='https:\/\/securityboulevard.com\/2024\/11\/how-to-reduce-risk-from-exposed-secrets\/' onclick='event.preventDefault()'>\r\n\t\tHow to Reduce Risk From Exposed Secrets<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:30:49-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Amanda Alvarez<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"d4d3701t3q\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Understand how secrets end up exposed, and how to prevent this risk.\u00a0 ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/how-to-reduce-risk-from-exposed-secrets\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:30:49-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/amanda-alvarez\/\" rel=\"author\">Amanda Alvarez<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/how-to-reduce-risk-from-exposed-secrets\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/how-to-reduce-risk-from-exposed-secrets\/&#038;text=How+to+Reduce+Risk+From+Exposed+Secrets\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/how-to-reduce-risk-from-exposed-secrets\/&#038;title=How+to+Reduce+Risk+From+Exposed+Secrets&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037569\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#85bac1f3mr\" href='https:\/\/securityboulevard.com\/2024\/11\/understanding-privileged-access-management-pam-a-comprehensive-guide\/' onclick='event.preventDefault()'>\r\n\t\tUnderstanding Privileged Access Management (PAM): A Comprehensive Guide<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:29:49-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Deepak Gupta - Tech Entrepreneur, Cybersecurity Author<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"85bac1f3mr\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Privileged Access Management (PAM) is crucial in today's threat landscape. This guide explores what PAM is, why it's essential for your organization, and how it safeguards against unauthorized access. Learn about best practices and key features to strengthen your security posture ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/understanding-privileged-access-management-pam-a-comprehensive-guide\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:29:49-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/deepak-gupta-tech-entrepreneur-cybersecurity-aut\/\" rel=\"author\">Deepak Gupta - Tech Entrepreneur, Cybersecurity Author<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher&feed_id=978&blog_url=https:\/\/guptadeepak.com\/\">Meet the Tech Entrepreneur, Cybersecurity Author, and Researcher<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/understanding-privileged-access-management-pam-a-comprehensive-guide\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/understanding-privileged-access-management-pam-a-comprehensive-guide\/&#038;text=Understanding+Privileged+Access+Management+%28PAM%29%3A+A+Comprehensive+Guide\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/understanding-privileged-access-management-pam-a-comprehensive-guide\/&#038;title=Understanding+Privileged+Access+Management+%28PAM%29%3A+A+Comprehensive+Guide&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037534\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#24c0fd0pkb\" href='https:\/\/securityboulevard.com\/2024\/11\/how-to-read-review-and-analyze-a-soc-2-report\/' onclick='event.preventDefault()'>\r\n\t\tHow to Read, Review, and Analyze a SOC 2 Report<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:12:11-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Kyle Morris, Senior Compliance Success Manager, Scytale<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"24c0fd0pkb\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Discover how to maximize the value of your SOC 2 report to enhance your business\u2019s security posture and strengthen trust. The post How to Read, Review, and Analyze a SOC 2 Report appeared first on Scytale ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/how-to-read-review-and-analyze-a-soc-2-report\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:12:11-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/kyle-morris-senior-compliance-success-manager-scyt\/\" rel=\"author\">Kyle Morris, Senior Compliance Success Manager, Scytale<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Blog | Scytale&feed_id=937&blog_url=https:\/\/scytale.ai\/resources\/category\/blog\/\">Blog | Scytale<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/how-to-read-review-and-analyze-a-soc-2-report\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/how-to-read-review-and-analyze-a-soc-2-report\/&#038;text=How+to+Read%2C+Review%2C+and+Analyze+a+SOC+2+Report\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/how-to-read-review-and-analyze-a-soc-2-report\/&#038;title=How+to+Read%2C+Review%2C+and+Analyze+a+SOC+2+Report&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037509\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#da0a267vrf\" href='https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/' onclick='event.preventDefault()'>\r\n\t\tHuge Leak of Customer Data Includes Military Personnel Info<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:07:01-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Jeffrey Burt<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"da0a267vrf\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">EnamelPins, which manufactures and sells medals, pins, and other emblematic accessories, for months left open an Elasticsearch instance that exposed 300,000 customer emails, including 2,500 from military and government personnel. The company, based in California, also has links to China, Cybernews researchers wrote ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:07:01-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/&#038;text=Huge+Leak+of+Customer+Data+Includes+Military+Personnel+Info\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/huge-leak-of-customer-data-includes-military-personnel-info\/&#038;title=Huge+Leak+of+Customer+Data+Includes+Military+Personnel+Info&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037524\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#0211f197zr\" href='https:\/\/securityboulevard.com\/2024\/11\/walking-the-walk-how-tenable-embraces-its-secure-by-design-pledge-to-cisa\/' onclick='event.preventDefault()'>\r\n\t\tWalking the Walk: How Tenable Embraces Its &#8220;Secure by Design&#8221; Pledge to CISA<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T09:00:00-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Blake Kizer<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"0211f197zr\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">As a cybersecurity leader, Tenable was proud to be one of the original signatories of CISA\u2019s \u201cSecure by Design\" pledge earlier this year. Our embrace of this pledge underscores our commitment to security-first principles and reaffirms our dedication to shipping robust, secure products that our users can trust. Read on to learn how we\u2019re standing ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/walking-the-walk-how-tenable-embraces-its-secure-by-design-pledge-to-cisa\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T09:00:00-05:00\">6 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/blake-kizer\/\" rel=\"author\">Blake Kizer<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Tenable Blog&feed_id=907&blog_url=https:\/\/www.tenable.com\/\">Tenable Blog<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/walking-the-walk-how-tenable-embraces-its-secure-by-design-pledge-to-cisa\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/walking-the-walk-how-tenable-embraces-its-secure-by-design-pledge-to-cisa\/&#038;text=Walking+the+Walk%3A+How+Tenable+Embraces+Its+%26%238220%3BSecure+by+Design%26%238221%3B+Pledge+to+CISA\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/walking-the-walk-how-tenable-embraces-its-secure-by-design-pledge-to-cisa\/&#038;title=Walking+the+Walk%3A+How+Tenable+Embraces+Its+%26%238220%3BSecure+by+Design%26%238221%3B+Pledge+to+CISA&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037503\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#a518cc4e7t\" href='https:\/\/securityboulevard.com\/2024\/11\/in-a-growing-threat-landscape-companies-must-do-three-things-to-get-serious-about-cybersecurity\/' onclick='event.preventDefault()'>\r\n\t\tIn a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:44:39-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Paul Laudanski<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"a518cc4e7t\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Several macro-trends \u2013 such as growing digital transformation, rising hybrid work and, especially, booming AI adoption \u2013 have created an increasingly sophisticated threat landscape ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/in-a-growing-threat-landscape-companies-must-do-three-things-to-get-serious-about-cybersecurity\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:44:39-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/paul-laudanski\/\" rel=\"author\">Paul Laudanski<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/in-a-growing-threat-landscape-companies-must-do-three-things-to-get-serious-about-cybersecurity\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/in-a-growing-threat-landscape-companies-must-do-three-things-to-get-serious-about-cybersecurity\/&#038;text=In+a+Growing+Threat+Landscape%2C+Companies+Must+do+Three+Things+to+Get+Serious+About+Cybersecurity\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/in-a-growing-threat-landscape-companies-must-do-three-things-to-get-serious-about-cybersecurity\/&#038;title=In+a+Growing+Threat+Landscape%2C+Companies+Must+do+Three+Things+to+Get+Serious+About+Cybersecurity&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037501\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#fca3feawm6\" href='https:\/\/securityboulevard.com\/2024\/11\/better-prioritization-and-network-clarity-can-close-the-gap-between-application-security-and-speed\/' onclick='event.preventDefault()'>\r\n\t\tBetter Prioritization and Network Clarity Can Close the Gap Between Application Security and Speed<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:30:38-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Kyle Wickert<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"fca3feawm6\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">A strategic approach to achieving speed without sacrificing protection requires a deliberate focus on application connectivity ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/better-prioritization-and-network-clarity-can-close-the-gap-between-application-security-and-speed\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:30:38-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/kyle-wickert\/\" rel=\"author\">Kyle Wickert<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/better-prioritization-and-network-clarity-can-close-the-gap-between-application-security-and-speed\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/better-prioritization-and-network-clarity-can-close-the-gap-between-application-security-and-speed\/&#038;text=Better+Prioritization+and+Network+Clarity+Can+Close+the+Gap+Between+Application+Security+and+Speed\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/better-prioritization-and-network-clarity-can-close-the-gap-between-application-security-and-speed\/&#038;title=Better+Prioritization+and+Network+Clarity+Can+Close+the+Gap+Between+Application+Security+and+Speed&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037498\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#817df0ewa3\" href='https:\/\/securityboulevard.com\/2024\/11\/defining-cyber-risk-assessment-and-a-compliance-gap-analysis-and-how-they-can-be-used-together\/' onclick='event.preventDefault()'>\r\n\t\tDefining Cyber Risk Assessment and a Compliance Gap Analysis and How They Can be Used Together<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:17:11-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Greg Neville<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"817df0ewa3\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">A cyber risk assessment is a tool that helps organizations identify and prioritize risks associated with threats that are relevant to their unique environment ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/defining-cyber-risk-assessment-and-a-compliance-gap-analysis-and-how-they-can-be-used-together\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:17:11-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/greg-neville\/\" rel=\"author\">Greg Neville<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/defining-cyber-risk-assessment-and-a-compliance-gap-analysis-and-how-they-can-be-used-together\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/defining-cyber-risk-assessment-and-a-compliance-gap-analysis-and-how-they-can-be-used-together\/&#038;text=Defining+Cyber+Risk+Assessment+and+a+Compliance+Gap+Analysis+and+How+They+Can+be+Used+Together\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/defining-cyber-risk-assessment-and-a-compliance-gap-analysis-and-how-they-can-be-used-together\/&#038;title=Defining+Cyber+Risk+Assessment+and+a+Compliance+Gap+Analysis+and+How+They+Can+be+Used+Together&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037514\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#3304143pf4\" href='https:\/\/securityboulevard.com\/2024\/11\/stay-safe-online-this-black-friday-protect-your-digital-security-while-scoring-the-best-deals\/' onclick='event.preventDefault()'>\r\n\t\tStay Safe Online This Black Friday: Protect Your Digital Security While Scoring the Best Deals<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:15:11-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Rosa Lear<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"3304143pf4\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">\u2018Tis the week of Black Friday deals, where the excitement of snagging those incredible deals can sometimes overshadow the importance of staying safe online. With cybercriminals on the prowl, it\u2019s crucial to take steps to protect your digital security while shopping. Here are some tips to help you stay safe and secure during this shopping ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/stay-safe-online-this-black-friday-protect-your-digital-security-while-scoring-the-best-deals\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T08:15:11-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/rosa-lear\/\" rel=\"author\">Rosa Lear<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=BlackCloak | Protect Your Digital Life\u2122&feed_id=838&blog_url=https:\/\/blackcloak.io\/\">BlackCloak | Protect Your Digital Life\u2122<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/stay-safe-online-this-black-friday-protect-your-digital-security-while-scoring-the-best-deals\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/stay-safe-online-this-black-friday-protect-your-digital-security-while-scoring-the-best-deals\/&#038;text=Stay+Safe+Online+This+Black+Friday%3A+Protect+Your+Digital+Security+While+Scoring+the+Best+Deals\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/stay-safe-online-this-black-friday-protect-your-digital-security-while-scoring-the-best-deals\/&#038;title=Stay+Safe+Online+This+Black+Friday%3A+Protect+Your+Digital+Security+While+Scoring+the+Best+Deals&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037480\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#6d32ee6a0u\" href='https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/' onclick='event.preventDefault()'>\r\n\t\tThe Cyberthreats from China are Ongoing: U.S. Officials<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T07:32:00-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Jeffrey Burt<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"6d32ee6a0u\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">U.S. officials are pushing back at the ongoing threats posted by Chinese state-sponsored hackers like Volt Typhoon and Salt Typhoon, which have infiltrated critical infrastructure organizations to steal information and preposition themselves in case of a conflict breaking out between the two countries ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T07:32:00-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/&#038;text=The+Cyberthreats+from+China+are+Ongoing%3A+U.S.+Officials\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/the-cyberthreats-from-china-are-ongoing-u-s-officials\/&#038;title=The+Cyberthreats+from+China+are+Ongoing%3A+U.S.+Officials&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037516\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#327f457r1n\" href='https:\/\/securityboulevard.com\/2024\/11\/security-analysis-of-the-merge-voting-protocol\/' onclick='event.preventDefault()'>\r\n\t\tSecurity Analysis of the MERGE Voting Protocol<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T07:09:05-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Bruce Schneier<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"327f457r1n\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Interesting analysis: An Internet Voting System Fatally Flawed in Creative New Ways. Abstract: The recently published \u201cMERGE\u201d protocol is designed to be used in the prototype CAC-vote system. The voting kiosk and protocol transmit votes over the internet and then transmit voter-verifiable paper ballots through the mail. In the MERGE protocol, the votes transmitted over ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/security-analysis-of-the-merge-voting-protocol\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T07:09:05-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/bruce-schneier\/\" rel=\"author\">Bruce Schneier<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Schneier on Security&feed_id=485&blog_url=https:\/\/www.schneier.com\/\">Schneier on Security<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/security-analysis-of-the-merge-voting-protocol\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/security-analysis-of-the-merge-voting-protocol\/&#038;text=Security+Analysis+of+the+MERGE+Voting+Protocol\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/security-analysis-of-the-merge-voting-protocol\/&#038;title=Security+Analysis+of+the+MERGE+Voting+Protocol&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037522\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#248a522h7e\" href='https:\/\/securityboulevard.com\/2024\/11\/whats-new-in-codesentry-6-2\/' onclick='event.preventDefault()'>\r\n\t\tWhat\u2019s New in CodeSentry 6.2\u00a0<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T06:33:21-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Walter Capitani<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"248a522h7e\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Explore the latest features and enhancements in CodeSentry 6.2 SaaS! We are excited to announce several enhancements in the latest release of CodeSentry:\u00a0 Operating System and Package Analysis (Windows): Improved Package Naming accuracy where package versions are removed from the package names before they are displayed in the SBOM More compact CycloneDX Export The CycloneDX\u2026 ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/whats-new-in-codesentry-6-2\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T06:33:21-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/walter-capitani\/\" rel=\"author\">Walter Capitani<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=CodeSecure&feed_id=716&blog_url=https:\/\/codesecure.com\/\">CodeSecure<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/whats-new-in-codesentry-6-2\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/whats-new-in-codesentry-6-2\/&#038;text=What%E2%80%99s+New+in+CodeSentry+6.2%C2%A0\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/whats-new-in-codesentry-6-2\/&#038;title=What%E2%80%99s+New+in+CodeSentry+6.2%C2%A0&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037478\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#3ee2a873zo\" href='https:\/\/securityboulevard.com\/2024\/11\/blov-html-crypter-phishing-evasion-through-encryption-and-obfuscation\/' onclick='event.preventDefault()'>\r\n\t\tBlov HTML Crypter: Phishing Evasion Through Encryption and Obfuscation<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T06:00:33-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> SlashNext Research Team<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"3ee2a873zo\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Cybercriminals are sharpening their phishing tactics with tools like Blov HTML Crypter \u2014 a utility that modifies HTML files to evade detection by security scanners. By employing techniques such as minification, encryption, and encoding, this tool transforms malicious HTML content into a form that\u2019s harder for security systems to recognize. Contact a SlashNext security expert ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/blov-html-crypter-phishing-evasion-through-encryption-and-obfuscation\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T06:00:33-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/slashnext-research-team\/\" rel=\"author\">SlashNext Research Team<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=SlashNext&feed_id=614&blog_url=https:\/\/slashnext.com\">SlashNext<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/blov-html-crypter-phishing-evasion-through-encryption-and-obfuscation\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/blov-html-crypter-phishing-evasion-through-encryption-and-obfuscation\/&#038;text=Blov+HTML+Crypter%3A+Phishing+Evasion+Through+Encryption+and+Obfuscation\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/blov-html-crypter-phishing-evasion-through-encryption-and-obfuscation\/&#038;title=Blov+HTML+Crypter%3A+Phishing+Evasion+Through+Encryption+and+Obfuscation&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037482\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#6d62d75lqk\" href='https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/' onclick='event.preventDefault()'>\r\n\t\tVoice Phishing Attacks: How to Prevent and Respond to Them<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T05:15:35-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Nitzan Gursky<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"6d62d75lqk\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">Have you ever received a call from an unknown number and wondered who could be on the other end? It could be a vishing scam. Vishing, a combination of \u201cvoice\u201d and \u201cphishing\u201d, is a fraudulent scheme that aims to trick you into revealing sensitive information.\u00a0 During a vishing call, a skilled scammer uses social engineering ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T05:15:35-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/nitzan-gursky\/\" rel=\"author\">Nitzan Gursky<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Cyber Security Awareness Training Blog | CybeReady&feed_id=770&blog_url=https:\/\/cybeready.com\/blog\">Cyber Security Awareness Training Blog | CybeReady<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/&#038;text=Voice+Phishing+Attacks%3A+How+to+Prevent+and+Respond+to+Them\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/&#038;title=Voice+Phishing+Attacks%3A+How+to+Prevent+and+Respond+to+Them&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div>\n<div class=\"panel panel-default pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037489\">\r\n<div class=\"panel-heading pt-cv-title\">\r\n    <a class=\"panel-title\" data-toggle=\"cvcollapse\" data-parent=\"#2a35dda8vz\" data-target=\"#8b25c01nd4\" href='https:\/\/securityboulevard.com\/2024\/11\/top-7-vanta-alternatives-to-consider-in-2025\/' onclick='event.preventDefault()'>\r\n\t\tTop 7 Vanta Alternatives to Consider in 2025<span class='entry-date-title'><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T01:20:09-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> Rebecca Kappel<\/span><\/div><\/span>\t<\/a>\r\n\t<span class=\"pull-right clickable panel-collapsed\"><i class=\"glyphicon glyphicon-plus\"><\/i><\/span><\/div>\r\n<div id=\"8b25c01nd4\" class=\"panel-collapse collapse \">\r\n\t<div class=\"panel-body\">\r\n\t\t<div class=\"pt-cv-content\">The Rise of Compliance-Centric Platforms Vanta was developed to help organizations achieve SOC 2 compliance quickly. Compliance management platforms have gained significant traction in the market. For startups and smaller businesses, these certifications are often crucial for breaking into markets where enterprise clients expect certain compliance standards as baseline requirements. Vanta offers robust integrations that ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/top-7-vanta-alternatives-to-consider-in-2025\/\" class=\"_blank pt-cv-readmore btn btn-success cvplbd\" target=\"_blank\">Read More<\/a><\/div><\/div>\n<div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-11-25T01:20:09-05:00\">7 days ago<\/time><\/span><span> |<\/span><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/rebecca-kappel\/\" rel=\"author\">Rebecca Kappel<\/a><\/span><\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Centraleyes&feed_id=988&blog_url=https:\/\/www.centraleyes.com\/\">Centraleyes<\/a><\/div><\/div><\/div><\/div>\n<div class=\"pt-cv-social-buttons\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/securityboulevard.com\/2024\/11\/top-7-vanta-alternatives-to-consider-in-2025\/\" class=\"pt-cv-social-facebook\" target=\"_blank\"><\/a><a href=\"https:\/\/x.com\/intent\/tweet?url=https:\/\/securityboulevard.com\/2024\/11\/top-7-vanta-alternatives-to-consider-in-2025\/&#038;text=Top+7+Vanta+Alternatives+to+Consider+in+2025\" class=\"pt-cv-social-twitter\" target=\"_blank\"><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/securityboulevard.com\/2024\/11\/top-7-vanta-alternatives-to-consider-in-2025\/&#038;title=Top+7+Vanta+Alternatives+to+Consider+in+2025&#038;summary=&#038;source=\" class=\"pt-cv-social-linkedin\" target=\"_blank\"><\/a><\/div>\t<\/div>\r\n<\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><ul class=\"pt-cv-pagination pt-cv-ajax pagination\" data-totalpages=\"10\" data-currentpage=\"1\" data-sid=\"9982238a4v\" data-unid=\"\" data-isblock=\"\" data-postid=\"\"><li class=\"active\"><a href=\"#\">1<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1778256\/?_page=2\">2<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1778256\/?_page=3\">3<\/a><\/li>\n\t<li ><a href=\"#\">&hellip;<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1778256\/?_page=10\">10<\/a><\/li>\n\t<li ><a class=\" \" href=\"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1778256\/?_page=2\">&rsaquo;<\/a><\/li>\n\t<\/ul><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-1428d4av82\">#pt-cv-view-9982238a4v .pt-cv-content-item { margin-left: 3px !important; }\n#pt-cv-view-9982238a4v  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-9982238a4v .pt-cv-content-item { padding-left: 0px !important; }\n#pt-cv-view-9982238a4v .pt-cv-title a, #pt-cv-view-9982238a4v  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n@media (max-width: 767px) {#pt-cv-view-9982238a4v .pt-cv-title a, #pt-cv-view-9982238a4v  .panel-title { font-size: 14px !important }}\n#pt-cv-view-9982238a4v  .pt-cv-title a:hover, #pt-cv-view-9982238a4v  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-9982238a4v .pt-cv-content , #pt-cv-view-9982238a4v  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-9982238a4v .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-9982238a4v .pt-cv-meta-fields {text-align: left; clear: both}\n#pt-cv-view-9982238a4v .pt-cv-meta-fields * { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-9982238a4v .pt-cv-custom-fields * { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-9982238a4v .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-9982238a4v .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-9982238a4v  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-9982238a4v  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='9982238a4v'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-9982238a4v  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-9982238a4v  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='9982238a4v'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Bloggers Network has been promoting and distributing Cybersecurity news and blogs from some of the leading experts in the security industry for over 12 years.<\/p>\n","protected":false},"author":6042,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1778256","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Creators Network - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Security Bloggers Network has been promoting and distributing Cybersecurity news and blogs from some of the leading experts in the security industry for over 12 years.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/security-creators-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Creators Network\" \/>\n<meta property=\"og:description\" content=\"Security Bloggers Network has been promoting and distributing Cybersecurity news and blogs from some of the leading experts in the security industry for over 12 years.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/security-creators-network\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-14T17:09:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/security-creators-network\/\",\"url\":\"https:\/\/securityboulevard.com\/security-creators-network\/\",\"name\":\"Security Creators Network - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2018-07-22T07:25:02+00:00\",\"dateModified\":\"2024-03-14T17:09:40+00:00\",\"description\":\"Security Bloggers Network has been promoting and distributing Cybersecurity news and blogs from some of the leading experts in the security industry for over 12 years.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/security-creators-network\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/security-creators-network\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/security-creators-network\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Creators Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Creators Network - Security Boulevard","description":"Security Bloggers Network has been promoting and distributing Cybersecurity news and blogs from some of the leading experts in the security industry for over 12 years.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/security-creators-network\/","og_locale":"en_US","og_type":"article","og_title":"Security Creators Network","og_description":"Security Bloggers Network has been promoting and distributing Cybersecurity news and blogs from some of the leading experts in the security industry for over 12 years.","og_url":"https:\/\/securityboulevard.com\/security-creators-network\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2024-03-14T17:09:40+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/security-creators-network\/","url":"https:\/\/securityboulevard.com\/security-creators-network\/","name":"Security Creators Network - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2018-07-22T07:25:02+00:00","dateModified":"2024-03-14T17:09:40+00:00","description":"Security Bloggers Network has been promoting and distributing Cybersecurity news and blogs from some of the leading experts in the security industry for over 12 years.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/security-creators-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/security-creators-network\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/security-creators-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Security Creators Network"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-7sBy","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1778256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1778256"}],"version-history":[{"count":2,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1778256\/revisions"}],"predecessor-version":[{"id":2011971,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1778256\/revisions\/2011971"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1778256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}