ConductorOne has extended the reach of its identity governance platform to artificial intelligence (AI) tools, agents and integrations based on the Model Context Protocol (MCP). Additionally, the company has now integrated its namesake identity governance platform with the CrowdStrike Falcon…
Category: Security Boulevard
The Language of Emojis in Threat Intelligence: How Adversaries Signal, Obfuscate, and Coordinate Online
As threat actor activity continues to shift toward informal, fast-moving communication platforms such as Telegram and Discord, the way adversaries communicate is evolving. Emojis, often dismissed as casual or nontechnical, have become a meaningful part of that evolution. The post…
How Do I Make Kubernetes Self‑Service Without Losing Control?
Platform teams are under pressure to move faster, but handing full Kubernetes access to every developer is risky. Self‑service and control are not opposites; they are two sides of a well‑designed platform. The post How Do I Make Kubernetes Self‑Service…
At RSAC 2026, AI Redefines the Future of Penetration Testing
Penetration testing is undergoing a substantial shift as AI reshapes both attack and defense strategies. At RSA Conference 2026, multiple vendors pointed to the same underlying pressure: Attack surfaces are expanding more quickly, while the time required to detect and…
Open-Source FIM: Freely Available. But What Makes Them Expensive?
In a previous article, we explained why it is worth licensing File Integrity Monitoring (FIM) rather than using open-source alternatives. The decision is not “free vs paid”; it is about streamlined access to the risk management capabilities of FIM and…
Standardize or Suffer: The JCHK Blueprint for MSSPs Defending SMB and SME Clients
Advanced persistent threats don’t discriminate by organization size — they discriminate by defense capability. Nation-state actors and their proxies invest months conducting reconnaissance, moving laterally through networks with surgical patience, and exfiltrating data long before any alert fires. The reality…
How to Improve Google Workspace Phishing Protection for Schools Without Adding IT Burden
Phishing attacks remain one of the most common, and most successful, cyber threats targeting K–12 schools. As districts continue to rely on Google Workspace for communication, collaboration, and file sharing, it has become a prime entry point for attackers looking…
Shut the Front Door on Email Attacks: How to Scale Security Services Without Increasing Workload
Email remains the primary entry point for cyberattacks, driven largely by phishing and account compromise. For attackers, it is often the simplest and most scalable way to gain access: send enough emails, and eventually, someone clicks. What’s changing is not…
IMO Health: 5 Reasons security culture starts with trust
I recently had the opportunity to sit down with Lori Kevin, VP of Security and Compliance at IMO Health, for another installment of the Strategic CISOs conversations series. We covered a topic that many security leaders care about right now:…
OT Cyber Resilience: Strategic Data Protection for IEC 62443 and NIS2 Compliance
Learn how to protect OT systems, ICS, and SCADA infrastructure from ransomware with backup strategies built for legacy, air-gapped industrial environments. The post OT Cyber Resilience: Strategic Data Protection for IEC 62443 and NIS2 Compliance appeared first on Security Boulevard.…
Bank Negara Malaysia RMiT Update: New Authentication Rules for Fintech and Banks
Bank Negara Malaysia’s updated RMiT framework introduces stricter authentication rules for banks and fintech apps. Learn how passkeys, adaptive MFA, device binding, and risk-based authentication help meet compliance. The post Bank Negara Malaysia RMiT Update: New Authentication Rules for Fintech…
NSFOCUS Monthly APT Insights – January 2026
Regional APT Threat Situation In January 2026, the global threat hunting system of Fuying Lab detected a total of 26 APT attack activities. These activities were primarily concentrated in regions including East Asia, South Asia, and Eastern Europe, as shown…
News Alert: TAC Security surpasses 10,000 customers, scaling global VM and AppSec platform
NEW YORK, Apr. 1, 2026, CyberNewswire—TAC Infosec, a global leader in cybersecurity (NSE: TAC), with presence across 100+ countries, announced a historic milestone by crossing 10,000 clients – 6,500+ of TAC Security and 3,500+ of CyberScope, since April … (more…)…
Cybersecurity Can Learn from the Artemis Launch
Cybersecurity Can Learn from the Artemis Launch The Artemis II mission, bringing humans back to the Moon, had a successful launch today! An amazing cumulation of efforts to manage the mindboggling combination of risks to push a massive rocket into…
Post-Quantum Key Encapsulation Mechanisms in AI Proxy Orchestration
Explore how Post-Quantum Key Encapsulation Mechanisms (KEM) secure AI proxy orchestration and MCP deployments against future quantum threats. The post Post-Quantum Key Encapsulation Mechanisms in AI Proxy Orchestration appeared first on Security Boulevard. This article has been indexed from Security…
67% of SIEM Alerts Go Uninvestigated. AI Triage Fixes That Without Replacing Your SIEM
67% of SIEM alerts go uninvestigated. Learn how AI alert triage reduces false positives by 70-90% without replacing your SIEM — and why tuning rules alone makes the problem worse. The post 67% of SIEM Alerts Go Uninvestigated. AI Triage…
The AI SOC’s L1 Automation Ceiling: Why Classification Is Not Investigation
Most AI SOC platforms stop at alert classification. Learn why the L1 Automation Ceiling is structural, and how D3 Morpheus delivers L2-level investigation from a single platform. The post The AI SOC’s L1 Automation Ceiling: Why Classification Is Not Investigation…
Anthropic Claude Code Leak
IntroductionOn March 31, 2026, Anthropic accidentally exposed the full source code of Claude Code (its flagship terminal-based AI coding agent) through a 59.8 MB JavaScript source map (.map) file bundled in the public npm package @anthropic-ai/claude-code version 2.1.88. A security researcher, Chaofan…
Autonomous SOC Explained: How Agentic Investigation Solves What Playbooks Couldn’t
SOCs face 4,484 alerts/day with 53% false positives. Learn why SOAR hit its ceiling and how the Autonomous SOC model changes security operations. The post Autonomous SOC Explained: How Agentic Investigation Solves What Playbooks Couldn’t appeared first on D3 Security.…
Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access trojan to potentially millions of developer environments during a three-hour window on March 31. Key takeaways: The axios npm package, which has over…