Learn how to protect Model Context Protocol (MCP) metadata from side-channel attacks using quantum-resistant masking and advanced threat detection. The post Side-Channel Attack Mitigation for Quantum-Resistant MCP Metadata appeared first on Security Boulevard. This article has been indexed from Security…
Category: Security Boulevard
Booz Allen Rolls Out Vellox, a Five-Product AI Cyber Suite Built on Adversary Tradecraft
Booz Allen Hamilton is bringing a full product suite to RSAC 2026, and the pitch is blunt: human-speed defense no longer cuts it. The company’s new Vellox lineup spans five AI-native tools designed to match the pace of attackers who,…
CTG Launches Cyber Resilience Scoring Dashboard to Give CISOs a Single Risk Number
CTG, now operating under the Cegeka Group, is rolling out a cyber resilience scoring dashboard at RSAC 2026 that boils an organization’s security posture down to one number. The dashboard consolidates results from multiple security assessments into a single view.…
Bindplane Adds Autonomous Pipeline Monitoring and Threat Intel Enrichment Ahead of RSAC
Bindplane, the OpenTelemetry-based telemetry pipeline company, is bringing two new capabilities to RSAC 2026: Global Intelligence for autonomous pipeline management and Threat Intel Enrichment for real-time threat detection at the data layer. Global Intelligence monitors security data pipelines around the…
How capable are NHIs in managing company secrets
Are Non-Human Identities the Key to Effective Secrets Management? How do organizations protect their most sensitive secrets? The answer lies in the burgeoning field of Non-Human Identities (NHIs). With the rise of cloud technologies, the importance of managing NHIs effectively…
Is there an innovative way to manage Agentic AI risks
How Are Organizations Tackling the Challenges of Non-Human Identities? What steps are organizations taking to secure their digital environments from machine-based threats? Both opportunities and challenges arise with the introduction of non-human identities (NHIs). These machine identities are pivotal in…
When Data Mining Conti Leaks Leads to Actual Binaries and to a Hardcoded C2 With an Encryption Key on Tripod.com – Part Three
Dear blog readers, Continuing the “When Data Mining Conti Leaks Leads to Actual Binaries and to a Hardcoded C2 With an Encryption Key on Tripod.com – Part Two” blog post series in this post I’ll continue analyzing the next malicious…
A Compilation of BitCoin Wallet Addresses from the RAMP (Russian Anonymous Marketplace) Forum Members – A Compilation
Dear blog readers, In this post I’ll provide actionable intelligence on all the BitCoin wallet addresses from the RAMP (Russian Anonymous Marketplace) forum members with the idea to assist the security community fellow researchers and U.S Law Enforcement on its…
A Domains Portfolio Belonging to RAMP (Russian Anonymous Marketplace) Forum Members – A Compilation
Dear blog readers, In this post I’ll provide actionable intelligence based on the research and analysis which I posted in my previous “Dissecting the RAMP (Russian Anonymous Marketplace) Ransomware Forum – An Analysis” blog post and will provide actionable intelligence…
BSidesSLC 2025 – Faces In The Fog – Seth Law On Unconventional User Enumeration
Author, Creator & Presenter: Seth Law, Founder of Redpoint Security Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding BSidesSLC 2025 content on the Organizations’ YouTube Channel. The post BSidesSLC 2025 – Faces In The Fog –…
FIRESIDE CHAT: In the AI age, your MFA, authentication apps can be compromised in minutes
The authentication layer that corporate America spent a decade building is now a liability. Listen to the podcast:The day MFA became the problem That’s the blunt assessment of Kevin Surace, chairman of Token, a Rochester, N.Y.-based security company … (more…)…
What Is Physical AI, and What Does It Mean for Government?
From Davos insights to state readiness, let‘s explore how robotics and sensors are moving artificial intelligence into the physical world. The post What Is Physical AI, and What Does It Mean for Government? appeared first on Security Boulevard. This article…
RSAC 2026 Innovation Sandbox | ZeroPath: From Alarm Accumulation to Executable Fixes
Company Profile ZeroPath is an AI-native application security startup founded in 2024, and its core products also use the eponymous brand ZeroPath. The company focuses on using AI to automatically discover, verify and fix code vulnerabilities, trying to break through…
Does your NHI system deliver essential value
Is Your Organization’s Non-Human Identity Strategy Robust Enough? What if the backbone of your organization’s cybersecurity strategy is more susceptible to breaches than you think? Where machine identities increasingly outnumber human ones, focusing on Non-Human Identities (NHIs) is critical. NHIs…
Is your Agentic AI optimized for latest threats
What Are Non-Human Identities (NHIs) and Why Are They Critical in Cybersecurity? How do we ensure the security of these interactions? The concept of Non-Human Identities (NHIs) offers a compelling solution. NHIs, an advanced concept in cybersecurity, are designed to…
How relieved are you with your secrets vaulting strategy
Are You Confident in Your Secrets Vaulting Strategy? The management of machine identities—what the industry terms Non-Human Identities (NHIs)—has become a linchpin in safeguarding cloud environments. When organizations increasingly transition to cloud-based architectures, ensuring the security of NHIs and their…
CanisterWorm: The Self-Spreading npm Attack That Uses a Decentralized Server to Stay Alive
On March 20, 2026 at 20:45 UTC, Aikido Security detected an unusual pattern across the npm registry: dozens of packages from multiple organizations were receiving unauthorized patch updates, all containing the same hidden malicious code. What they had caught was…
BSidesSLC 2025 – • Al Red Teaming For Artificial Dummies
Author, Creator & Presenter: Bryson Loughmiller – Principal Platform Security Architect At Entrata Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding BSidesSLC 2025 content on the Organizations’ YouTube Channel. Permalink The post BSidesSLC 2025 – •…
Real Attack Alert Analysis: From Hidden Indicators to Actionable Threat Intelligence
Executive Overview Cyber threats are evolving rapidly, becoming more stealthy, automated, and difficult to detect using traditional security approaches. Attackers increasingly rely on legitimate system tools, encrypted communication, and internal reconnaissance to bypass defenses and operate unnoticed within enterprise environments.…
MY TAKE: As RSAC 2026 opens, AI has bifurcated cybersecurity into two wars—the clock is running
SAN FRANCISCO — RSAC 2026 opens here Monday at Moscone Center, with upwards of 40,000 cybersecurity professionals, executives, and policy leaders, myself among them, filing in to take stock of an industry under acute pressure. Related: RSAC 2026’s full agenda……