Category: EN

Turning plain language into firewall rules

Firewall rules often begin as a sentence in someone’s head. A team needs access to an application. A service needs to be blocked after hours. Translating those ideas into vendor specific firewall syntax usually involves detailed knowledge of zones, objects,…

The roles and challenges in moving to quantum-safe cryptography

A new research project examines how organizations, regulators, and technical experts coordinate the transition to quantum safe cryptography. The study draws on a structured workshop with public sector, private sector, and academic participants to document how governance, security, and innovation…

What security teams miss in email attacks

Email remains the most common entry point for attackers. This article examines how phishing, impersonation, and account takeover continue to drive email breaches and expose growing security gaps across industries. Email blind spots are back to bite security teams Email…

Passwords are still breaking compliance programs

The security stack has grown, but audits still stumble on passwords. CISOs see this every year. An organization may have strong endpoint tools, layered network defenses, and a documented access policy. Then the audit turns to shared credentials, spreadsheet-based password…

Post-Quantum Cryptographic Agility in MCP Tool Definition Schemas

Learn how to implement post-quantum cryptographic agility within Model Context Protocol (MCP) tool definition schemas to secure AI infrastructure against quantum threats. The post Post-Quantum Cryptographic Agility in MCP Tool Definition Schemas appeared first on Security Boulevard. This article has…

The Key Principles of Corporate Governance

What Is Corporate Governance? Corporate governance refers to the system of rules, practices, and processes used to direct and control an organization. It establishes how decisions are made, who has the authority to make them, and how those decisions are…

Check Point Secures AI Factories with NVIDIA

As businesses and service providers deploy AI tools and systems, having strong cyber security across the entire AI pipeline is a foundational requirement, from design to deployment. Even at this stage of AI adoption, attacks on AI infrastructure and prompt-based…

Why being proactive in NHI management is critical for security

Are You Guarding Your Machine Identities Effectively? The management of Non-Human Identities (NHIs) is a critical component of cybersecurity strategies for organizations operating in cloud environments. NHIs, essentially machine identities, represent a fusion of encrypted credentials, such as passwords or…

What makes Non-Human Identities safe?

How Can We Ensure Non-Human Identities Remain Protected? Are your organization’s Non-Human Identities (NHIs) secure from the impending cyber threats lurking in digital corners? While we delve into the intricacies of NHI security, the crucial aspects of managing these machine…

How can Agentic AI enhance cloud security?

What Makes Agentic AI a Game Changer in Cloud Security? How can organizations ensure the seamless protection of their digital assets when transitioning to the cloud? It’s a question that many industries such as financial services, healthcare, travel, and more…