Static playbooks can’t keep up. AI copilots don’t fix the real problem. Multi-agent systems just redistribute complexity. Here’s what security leaders should be evaluating instead. The post The SOAR Ceiling: Why Playbook Automation Has Hit Its Structural Limits appeared first…
Category: Security Boulevard
Randall Munroe’s XKCD ‘SNEWS’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘SNEWS’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall Munroe’s XKCD…
Menlo Security Adds Platform to Secure AI Agents
Menlo Security today launched a platform to secure artificial intelligence (AI) agents running in a browser that accesses a cloud-based environment where they can securely access applications. The company already provides a similar platform through which end users are able…
Everyone Is Deploying AI Agents. Almost Nobody Knows What They’re Doing.
One constant I hear from CISOs I speak with is that AI agents are not coming. They are already inside organizations, reasoning through goals, selecting tools, and taking action through the same APIs that connect your most sensitive systems. And…
The New Insider Threat: Autonomous Systems With Excessive Permissions
Explore how overprivileged AI agents are becoming the “new insider threat” in 2026. Learn about the rise of autonomous machine identities, the “superuser problem,” and real-world breaches like Amazon Q and EchoLeak that are forcing CISOs to rethink cybersecurity governance.…
Threat Detection with MITRE ATT&CK and D3FEND AI Agent
The post Threat Detection with MITRE ATT&CK and D3FEND AI Agent appeared first on AI Security Automation. The post Threat Detection with MITRE ATT&CK and D3FEND AI Agent appeared first on Security Boulevard. This article has been indexed from Security…
Enterprise AI Agent Governance: A Layered Approach (Build, Deployment and Runtime)
Emerging Governance Challenges As organizations implement AI agents on a large scale, they are likely to encounter governance challenges. The current focus in AI security primarily centers on several key concerns: prompt injection, model misuse, and unsafe responses. These issues…
Is All OAuth The Same For MCP?
Is the “S” in MCP missing? Explore the current state of Model Context Protocol security, from stdio vs. HTTP transport risks to the complexities of CIMD and OAuth implementations across different AI clients. The post Is All OAuth The Same…
Rethinking Cyber Awareness: From Blame to Belonging
Stop treating employees like the “weakest link.” Discover why traditional cybersecurity awareness training fails and how to build a culture of belonging through human-centered design, security guardrails, and collaborative resilience. The post Rethinking Cyber Awareness: From Blame to Belonging appeared…
Adaptability, Not Novelty: The Next Evolution of Malware
AI-enabled malware like VoidLink adapts to cloud misconfigurations in real time, showing how attackers exploit identity sprawl and configuration drift. The post Adaptability, Not Novelty: The Next Evolution of Malware appeared first on Security Boulevard. This article has been indexed…
AI Governance Starts With Access, Not Models | SaaS + AI
AI risk isn’t about models alone. Learn why SaaS + AI governance depends on access, OAuth, and integrations—and how to move from chaos to control. The post AI Governance Starts With Access, Not Models | SaaS + AI appeared first…
Why Your AI Is Failing in Production and How Strategic QA Fixes It
QA Is Not a Gatekeeper Anymore In traditional software, QA and software testing was the last step. Test the feature. Validate it. Release it. That…Read More The post Why Your AI Is Failing in Production and How Strategic QA Fixes…
Is Wix Secure Enough? Understanding the Next Layer of Protection for Growing Websites
You click “Publish” on your Wix site and breathe easy. HTTPS? Check. Automatic updates? Check. Hosting handled? Check. Your website feels bulletproof. But here is the catch: security is not. The post Is Wix Secure Enough? Understanding the Next Layer…
Exposed Ollama Servers: Security Risks of Publicly Accessible LLM Infrastructure
Learn how exposed Ollama servers can allow unauthorized model access, prompt abuse, and GPU resource consumption when LLM inference APIs are publicly accessible. The post Exposed Ollama Servers: Security Risks of Publicly Accessible LLM Infrastructure appeared first on Indusface. The…
Cyberattacks Spike 245% in the Two Weeks After the Start of War with Iran
Akamai researchers saw a 245% spike in cyberattacks in the first two weeks after the start of the U.S. and Israeli war against Iran as Iranian nation-state groups and independent hacktivists launch increasingly decentralized and destructive cyberattacks, which are expected…
News alert: GitGuardian study shows AI coding tools double leak rates as 29M credentials hit GitHub
NEW YORK, Mar.17, 2026, CyberNewswire — GitGuardian, the security leader behind GitHub’s most installed application, today released the 5th edition of its “State of Secrets Sprawl” report, documenting how mainstream AI adoption in 2025 reshaped software delivery and accelerated the…
Lattice-Based Identity and Access Management for AI Agents
Secure your AI agents with lattice-based IAM. Learn how ML-KEM and ML-DSA protect Model Context Protocol (MCP) from quantum threats and puppet attacks. The post Lattice-Based Identity and Access Management for AI Agents appeared first on Security Boulevard. This article…
[un]prompted: Key Insights from the AI Security Practitioners Conference – FireTail Blog
Mar 17, 2026 – Jeremy Snyder – The State of AI Security: Moving Beyond TheoryThe biggest shift evident at the [un]prompted AI Security Practitioners Conference was the move from purely theoretical discussions about “what could go wrong” to concrete, battle-tested…
Anton’s Vibe Coding Experience: A Reflection on Risk Decisions
Look, I’m not a developer, and the last time I truly “wrote code” was probably a good number of years ago (and it was probably Perl so you may hate me). I am also not an appsec expert (as I…
Hijacked npm Packages Deliver Malware via Solana, Linked to Glassworm
Sonatype Security Research has identified two hijacked npm packages in the React Native ecosystem that receive more than 30,000 downloads collectively per week and were modified to deliver multi-stage malware. Sonatype is tracking the malicious packages as sonatype-2026-001153. The post…