Category: Security Boulevard

Security at Scale: How Open VSX Is Raising the Bar

Security work is often most visible when something goes wrong: a compromised package, a leaked credential, a typosquatted extension, an abused automation token. In those moments, it becomes clear that software infrastructure is not abstract. It is operational, exposed, and…

PQ-Compliant Secure Multi-Party Computation for Model Contexts

Learn how Post-Quantum (PQ) Secure Multi-Party Computation protects Model Context Protocol (MCP) deployments from quantum threats while ensuring AI data privacy. The post PQ-Compliant Secure Multi-Party Computation for Model Contexts appeared first on Security Boulevard. This article has been indexed…

How can you be certain your AI is compliant?

How Does Non-Human Identity Management Enhance AI Compliance? When it comes to ensuring compliance in artificial intelligence systems, how do organizations manage the thousands of machine interactions that occur daily? This question is at the heart of discussions around AI…

Why should you be excited about Agentic AI in cybersecurity?

How Do Non-Human Identities Enhance Cloud Security? Have you ever wondered how to effectively manage the increasing complexity of cloud security amidst the rise of AI and digital transformations? Non-Human Identities (NHIs) might just be the solution you’re looking for.…

BSidesSLC 2025 – Risk Management Explained Through Star Wars

Author, Creator & Presenter: Kenny Scott – Founder & CEO Of Paramify Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding BSidesSLC 2025 content on the Organizations’ YouTube Channel. Permalink The post BSidesSLC 2025 – Risk Management…

While TSA Made Headlines, CISA Went Dark

The Department of Homeland Security has been partially shut down for over 45 days. In that time, 460 TSA officers have quit, absences at major airports have exceeded 30%, and the TSA acting head publicly warned the agency may need…

The EU CRA – Treating Cybersecurity as Product Liability

The EU’s Cyber Resilience Act (Regulation 2024/2847) shifts cybersecurity responsibility upstream. Explore the March 2026 guidance on secure-by-design requirements, software bills of materials (SBOM), and the impact on U.S. manufacturers. The post The EU CRA – Treating Cybersecurity as Product…

The Hidden Tracking Risk Inside Your Tires

In this episode, Tom Eston and co-host Scott Wright discuss research showing that Tire Pressure Monitoring Systems (TPMS) can create privacy risks because the sensors broadcast unencrypted, uniquely identifying wireless signals that could be used to track vehicles. They reference…

Attribute-Based Access Control for AI Capability Negotiation

Learn how Attribute-Based Access Control (ABAC) secures AI capability negotiation and MCP deployments against quantum threats and tool poisoning. The post Attribute-Based Access Control for AI Capability Negotiation appeared first on Security Boulevard. This article has been indexed from Security…

Are your NHIs fully supported for optimal performance?

The Strategic Imperative of Non-Human Identity Management How secure is your organization when it comes to managing Non-Human Identities (NHIs)? With the increasing prevalence of cyber threats, optimizing NHI performance has become a cornerstone of effective cybersecurity strategies. NHIs, essentially…

What role does innovation play in Agentic AI development?

How Are Non-Human Identities Shaping Cybersecurity? Have you ever wondered how machine identities are transforming cybersecurity dynamics? Managing Non-Human Identities (NHIs) has emerged as a significant focal point for security experts, especially in cloud environments. When organizations grapple with the…