A ball of energy with electricity beaming all over the place.

AI Adoption Prompts Security Advisory from NSA

The warning underscores the importance of a collaborative approach to AI security involving stakeholders across different domains, including data science and infrastructure ...
Security Boulevard

Declassified NSA Newsletters

Through a 2010 FOIA request (yes, it took that long), we have copies of the NSA’s KRYPTOS Society Newsletter, “Tales of the Krypt,” from 1994 to 2003. There are many interesting things ...
PAM, zero-trust, ZTNA, migrating, backup data, zero-trust, security, zero-trust, business, policy container zero-trust ZTNA

NSA Issues Guidance for Enterprises Adopting Zero Trust

The National Security Agency (NSA) wants organizations adopt zero-trust framework principles to protect their enterprise networks and is releasing guidance to help them get there. The agency is arguing that adopting controls ...
Security Boulevard

Volt Typhoon Malware: US Critical Infrastructure Breached

In a recent revelation, the U.S. government disclosed that the Chinese state-sponsored hacking group, Volt Typhoon has surreptitiously infiltrated critical infrastructure networks within the country for a staggering five-year period. This embedded ...
Apple CEO Tim Cook, with superimposed text: “No Such Agency”

NSA iPhone Backdoor? Apple Avoids Russian Blame Game

“No Ordinary Vulnerability” — Operation Triangulation research uncovers new details of fantastic attack chain ...
Security Boulevard

New NSA Information from (and About) Snowden

Interesting article about the Snowden documents, including comments from former Guardian editor Ewen MacAskill MacAskill, who shared the Pulitzer Prize for Public Service with Glenn Greenwald and Laura Poitras for their journalistic ...
NSA cybersecurity OT

NSA Releases EliteWolf GitHub Repository for Securing OT Environments

| | cisa, Cybersecurity, GitHub, nsa
The National Security Agency released a code repository in GitHub to make it easier for critical infrastructure organizations and similar entities to better identify and detect potentially malicious activities in their operational ...
Security Boulevard
credential stuffing attack

CISA and NSA Offer MFA and SSO Guidelines for Developers, Vendors

| | cisa, Cybersecurity, MFA, nsa, Phishing
Developers and tech vendors need to improve multifactor authentication (MFA) and single sign-on (SSO) tools and make them easier for organizations to use to reduce the threat of phishing, password spraying, and ...
Security Boulevard

Application Security Check Up