Category: Security Boulevard

Sonatype Discovers Two Malicious npm Packages

Sonatype Security Research has identified a potential compromise of a trusted npm maintainer account that has now published two malicious npm packages — sbx-mask and touch-adv — designed to exfiltrate secrets from victims’ computers. The post Sonatype Discovers Two Malicious npm…

How can Agentic AI help your business stay ahead

Are Businesses Truly Prepared for the Challenges Presented by Machine Identities? Cybersecurity is constantly evolving, and one of the emerging complexities is the management of Non-Human Identities (NHIs). These machine identities, require astute management to ensure robust security frameworks and…

Why is proactive NHI lifecycle management important

Are Organizations Truly Harnessing Non-Human Identity Lifecycle Management? The digital frontier is expanding, yet many organizations are still grappling with securing machine identities or Non-Human Identities (NHIs). How crucial is proactive NHI lifecycle management in maintaining robust cybersecurity? Let’s delve…

When Do We Actually Need a Kubernetes Platform Team?

Many teams start by running Kubernetes with a few enthusiastic engineers and some shared clusters. As those clusters become critical to your operations, you eventually have to decide when you actually need a dedicated Kubernetes platform team instead of ad‑hoc…

PowerShell Is a Security Risk – Here’s How to Fix It

If you run a Windows environment, you already know how critical PowerShell is. It’s the backbone of modern administration, used for automation, configuration, and day-to-day operations at scale. And it doesn’t stop at Windows. If you manage Azure, Microsoft 365, Entra ID, or Exchange Online,…

SIEM Is Not Dead. It Just Stopped Moving Fast Enough.

I recently joined Tim Peacock and Anton Chuvakin on the Google Cloud Security Podcast to talk about SIEM, AI SOC, pricing, federated architecture, detection engineering, and why network telemetry is quietly becoming important again. The short version is simple: SIEM…

BSidesCache 2025 – Oh, The Places Your Packets Will Go!

Author, Creator & Presenter: James Pope Our thanks to BSidesCache for publishing their Creators, Authors and Presenter’s outstanding BSidesCache 2025 content on the Organizations’ YouTube Channel. Permalink The post BSidesCache 2025 – Oh, The Places Your Packets Will Go! appeared…

What Is Data Mapping and Why It Matters for GDPR

The post <b>What Is Data Mapping and Why It Matters for GDPR</b> appeared first on Sovy. The post What Is Data Mapping and Why It Matters for GDPR appeared first on Security Boulevard. This article has been indexed from Security…

Security Architecture for Hybrid Work: Enterprise Guide

With 52% of U.S. employers adopting hybrid models, traditional perimeters are failing. Discover how to build a robust hybrid work security architecture using Secure SD-WAN, SASE, Zero Trust Network Access (ZTNA), and automated threat detection (SIEM/SOAR) to protect a dispersed…

Dormant Accounts Leave Manufacturing Orgs Open to Attack

While companies use “perp walks” for terminated employees, 48% of manufacturers fail to revoke digital access within 24 hours. Explore the growing risk of dormant accounts, the 74% automation gap in provisioning, and why experts like Darren Guccione and James…