Source: www.securityweek.com – Author: Tom Eston Some IoT products may make your life easier, but they also may be somewhat of a Trojan Horse. The post...
Author:
The Three Keys to Success in Cybersecurity – Source: securityboulevard.com
Source: securityboulevard.com – Author: Tom Eston In this episode, host Tom Eston shares the three key lessons he’s learned over his 18-year career in cybersecurity: effective...
The Year in Review and 2024 Predictions – Source: securityboulevard.com
Source: securityboulevard.com – Author: Tom Eston In our last episode of the year, we replay our predictions for 2023 reviewing what we got right and what...
SaaS Attacks: Compromising an Organization without Touching the Network – Source: securityboulevard.com
Source: securityboulevard.com – Author: Tom Eston In this episode Luke Jennings VP of Research & Development from Push Security joins us to discuss SaaS attacks and...
MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches – Source: securityboulevard.com
Source: securityboulevard.com – Author: Tom Eston Several major organizations, including British Airways and the BBC, fell victim to the recent MOVEit cyberattack. We discuss the alarming...
Meta’s $1.3 Billion Fine, AI Hoax Hysteria, Montana’s TikTok Ban – Source: securityboulevard.com
Source: securityboulevard.com – Author: Tom Eston In this episode, we discuss Meta’s record-breaking $1.3 billion fine by the EU for unlawfully transferring user data, shedding light...
Private Tweets Exposed, Unauthorized Tracking Collaboration, AI Risks and Regulation – Source: securityboulevard.com
Source: securityboulevard.com – Author: Tom Eston In this episode we discuss a recent Twitter security incident that caused private tweets sent to Twitter Circles to become...