Alex Vakulov, Author at Security Boulevard https://securityboulevard.com/author/alex-vakulov/ The Home of the Security Bloggers Network Sat, 31 Aug 2024 12:08:50 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.1 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Alex Vakulov, Author at Security Boulevard https://securityboulevard.com/author/alex-vakulov/ 32 32 133346385 Modern Strategies for IoT Device Fingerprinting https://securityboulevard.com/2024/08/modern-strategies-for-iot-device-fingerprinting/ Sat, 31 Aug 2024 12:08:50 +0000 https://securityboulevard.com/?p=2029410 IoT, fingerprinting

The widespread adoption of IoT devices has created new cybersecurity challenges, including those related to external attack surface management.

The post Modern Strategies for IoT Device Fingerprinting appeared first on Security Boulevard.

]]>
2029410
Deepfake Threats and Biometric Security Vulnerabilities https://securityboulevard.com/2024/07/deepfake-threats-and-biometric-security-vulnerabilities/ Wed, 10 Jul 2024 09:39:04 +0000 https://securityboulevard.com/?p=2023807 deepfake, organizations, attacks, biometric, security, identity

Grasping how biometric attacks work is crucial for organizations to make informed decisions based on actual threat intelligence.

The post Deepfake Threats and Biometric Security Vulnerabilities appeared first on Security Boulevard.

]]>
2023807
Stepping Into the Attacker’s Shoes: The Strategic Power of Red Teaming (Insights from the Field) https://securityboulevard.com/2024/06/stepping-into-the-attackers-shoes-the-strategic-power-of-red-teaming-insights-from-the-field/ Wed, 26 Jun 2024 06:00:44 +0000 https://securityboulevard.com/?p=2022528 red teaming, red, security, SOCs

Red Teaming security assessments aim to demonstrate to clients how attackers in the real world might link together various exploits and attack methods to reach their objectives.

The post Stepping Into the Attacker’s Shoes: The Strategic Power of Red Teaming (Insights from the Field) appeared first on Security Boulevard.

]]>
2022528
Stepping Into the Attacker’s Shoes: The Strategic Power of Red Teaming https://securityboulevard.com/2024/05/stepping-into-the-attackers-shoes-the-strategic-power-of-red-teaming/ Mon, 13 May 2024 12:00:45 +0000 https://securityboulevard.com/?p=2017518 Red Teaming, cybersecurity,

Red Teaming exercises bring in a team of reliable experts who can demonstrate what your organization's cybersecurity really looks like. Here’s how they work.

The post Stepping Into the Attacker’s Shoes: The Strategic Power of Red Teaming appeared first on Security Boulevard.

]]>
2017518
How to Streamline the Vulnerability Management Life Cycle https://securityboulevard.com/2024/03/how-to-streamline-the-vulnerability-management-life-cycle/ Mon, 11 Mar 2024 13:00:20 +0000 https://securityboulevard.com/?p=2011320 vulnerability management lifecycle

Establishing a vulnerability management process is a crucial part of an organization's cybersecurity strategy and demands thoughtful planning.

The post How to Streamline the Vulnerability Management Life Cycle appeared first on Security Boulevard.

]]>
2011320
Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security https://securityboulevard.com/2023/12/beyond-dlp-embracing-a-multi-layered-strategy-for-personal-data-security/ Tue, 19 Dec 2023 14:00:12 +0000 https://securityboulevard.com/?p=2002262 data, breaches, data breaches, NetApp data broker FTC location data

DLP plays an important role, but it's not the only necessary component in a robust data protection strategy.

The post Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security appeared first on Security Boulevard.

]]>
2002262
The Intricacies of Constructing an Efficient Security Operations Center https://securityboulevard.com/2023/11/the-intricacies-of-constructing-an-efficient-security-operations-center/ Thu, 09 Nov 2023 14:00:10 +0000 https://securityboulevard.com/?p=1997542 provider, service provider, security operations center, SOC, Ways of DevSecOps

Plenty of organizations are considering setting up their own security operations center (SOC). The prospect of having the entire infrastructure under the stringent scrutiny of information security monitoring is appealing – it is a strong line of defense against potential threats. However, the question of who will actually construct this SOC and how they will..

The post The Intricacies of Constructing an Efficient Security Operations Center appeared first on Security Boulevard.

]]>
1997542
Exploring the Flaws in Contactless Bank Card Security https://securityboulevard.com/2023/11/exploring-the-flaws-in-contactless-bank-card-security/ Mon, 06 Nov 2023 14:00:00 +0000 https://securityboulevard.com/?p=1997556 BFSI card, contactless banking FinCEN

Despite the convenience of contactless card payments, bank cards can be compromised through NFC technology.

The post Exploring the Flaws in Contactless Bank Card Security appeared first on Security Boulevard.

]]>
1997556
Securing Remote Workers With Firewall-as-a-Service https://securityboulevard.com/2022/02/securing-remote-workers-with-firewall-as-a-service/ Mon, 14 Feb 2022 08:00:04 +0000 https://securityboulevard.com/?p=1911038 Aviatrix firewalls Oracle Firewall Cisco Next-Gen Firewall Sizing

In today’s era of remote and hybrid work, organizations continue to grapple with many cybersecurity questions. What solutions can help companies effectively and securely manage remote employees? Is it possible to protect network traffic using cloud computing? How have targeted cyberattacks and advanced persistent threats (APTs) influenced the development of next-generation firewalls? And can firewall-as-a-service..

The post Securing Remote Workers With Firewall-as-a-Service appeared first on Security Boulevard.

]]>
1911038
How to Protect Corporate Mobile Devices https://securityboulevard.com/2022/02/how-to-protect-corporate-mobile-devices/ Thu, 10 Feb 2022 08:00:28 +0000 https://securityboulevard.com/?p=1910729 smishing USPS scam

There are several essential questions organizations must answer with regard to the protection of corporate mobile devices. What threats do we protect work smartphones from? Which mobile operating systems are more secure? How do approaches to combat threats depend on the chosen policy—BYOD, COPE, CYOD? What tools and methods are relevant today in the mobile..

The post How to Protect Corporate Mobile Devices appeared first on Security Boulevard.

]]>
1910729