Category: Security Boulevard

How controlled should your cloud-native AI security be

Are Your Machine Identities and Secrets Secure? The management of Non-Human Identities (NHIs) and secrets is a foundational aspect of robust cloud-native security. NHIs, often described as machine identities, are critical in ensuring that systems communicate safely and efficiently. Unlike…

Are you certain your Agentic AI optimally performs

How Can Non-Human Identities Enhance Agentic AI Performance? What strategies are you employing to manage non-human identities (NHIs) within your organization? The notion of NHIs encompasses more than just machine identities; it’s about the seamless coordination between cybersecurity and R&D…

How smart is your approach to Agentic AI management

How Can We Leverage Agentic AI Management to Secure Non-Human Identities? Where machine identities outnumber human users, consistently interacting within complex clouds. How do we effectively secure these digital entities to prevent cyber threats? Welcome to Non-Human Identities (NHIs) where…

TDL 018 | How To Think, Not What To Think | Mitch Prior

The Human Algorithm in a Zero-Trust World In the latest episode of The Defender’s Log, host David Redekop sits down with cybersecurity expert Mitch Prior to discuss the intersection of high-tech security and human intuition. From their first meeting in…

BSidesSLC 2025 – Security Con For Dummies – An Intro

Author, Creator & Presenter: Bryson Loughmiller – Principal Platform Security Architect At Entrata Our thanks to BSidesSLC for publishing their Creators, Authors and Presenter’s outstanding BSidesSLC 2025 content on the Organizations’ YouTube Channel. Permalink The post BSidesSLC 2025 – Security…

Randall Munroe’s XKCD ‘Plums’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Plums’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall Munroe’s XKCD…

Chainguard Assemble 2026 and the Security Factory Mindset

From golden images to agent governance, Chainguard Assemble 2026 focused on how teams can reduce risk by embedding trust, compliance, and security into delivery systems. The post Chainguard Assemble 2026 and the Security Factory Mindset appeared first on Security Boulevard.…

Cloud Security Posture Management in 2026

By 2026, CSPM has evolved from a basic auditor into an AI-driven, context-aware pillar of CNAPP. Explore how modern Cloud Security Posture Management integrates with DevOps, utilizes “Security as Code,” and automates remediation across AWS, Azure, and GCP to eliminate…

Securing E-commerce Transactions with Modern Authentication

Protect e-commerce transactions with OTP, passkeys, and fraud detection. Reduce shipping fraud and secure high-value purchases easily. The post Securing E-commerce Transactions with Modern Authentication appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the…

Why MCP Gateways are a Bad Idea (and What to Do Instead)

MCP Gateways are the wrong abstraction for AI security. Discover why runtime hooks and MCP registries offer a superior, context-aware defense against data leaks and unauthorized tool calls in modern agentic architectures. The post Why MCP Gateways are a Bad…

Key Aspects of EASA Certification and Compliance

Key Takeaways EASA certification is not a single standard. It is a layered regulatory system that applies differently depending on your role in the aviation ecosystem. At a high level, organizations typically fall into one or more of the following…

Sonatype Discovers Two Malicious npm Packages

Sonatype Security Research has identified a potential compromise of a trusted npm maintainer account that has now published two malicious npm packages — sbx-mask and touch-adv — designed to exfiltrate secrets from victims’ computers. The post Sonatype Discovers Two Malicious npm…