For companies running a modern, adaptive and defense-centered security program, threat modeling is not a new concept. In fact, it’s one of the core tenets of preventative cybersecurity best practices. Being able to find vulnerabilities within software or a network,…
Category: Security Boulevard
Academia and the “AI Brain Drain”
In 2025, Google, Amazon, Microsoft and Meta collectively spent US$380 billion on building artificial-intelligence tools. That number is expected to surge still higher this year, to $650 billion, to fund the building of physical infrastructure, such as data centers (see…
Understanding SOC 2 Controls for SaaS Providers
For SaaS providers, trust is a core part of the offering. Customers rely on software platforms to process data, support business operations, and integrate with wider technology ecosystems. As a result, demonstrating effective security and governance controls using frameworks like…
How Breach-Focused Microsegmentation Could Have Contained AWS’s AI Agent Outages
The AWS AI Agent Incidents This report reviews the breaking news about AWS AI outages, analyzes architectural failure modes, and demonstrates how ColorTokens Xshield microsegmentation, designed to stop breach proliferation, could have changed the outcome. In late 2024 and 2025, Amazon Web…
Decoding the White House Cyber Strategy: Why Resilience Matters Now
America’s new National Cyber Strategy sends a very clear message that cybersecurity is now about resilience, not just defense. The strategy emphasizes modernizing federal networks, protecting critical infrastructure, and deploying AI-enabled cybersecurity capabilities to detect and disrupt threats at scale.…
Making the Internet Safer for Children: The Case for Automated, Privacy-Preserving Solutions
AI tools may better protect children online by detecting harmful content without the privacy risks of strict age verification laws. The post Making the Internet Safer for Children: The Case for Automated, Privacy-Preserving Solutions appeared first on Security Boulevard. This…
AI in the SOC: Why Explainability is the New Security Control
AI is transforming the SOC, but without explainability analysts can’t trust it. Why transparency is becoming a critical security control. The post AI in the SOC: Why Explainability is the New Security Control appeared first on Security Boulevard. This article…
How Threat Intelligence Protects Player Experience for Betting and Gaming Customers
Threat intelligence and bot mitigation strategies help gaming and betting platforms stop credential stuffing, scraping and automated fraud. The post How Threat Intelligence Protects Player Experience for Betting and Gaming Customers appeared first on Security Boulevard. This article has been…
From Legacy Logins to Federated Identity: A Step-by-Step Modernization Framework
Learn how to modernize legacy login systems with a step-by-step framework for implementing secure federated identity and modern authentication. The post From Legacy Logins to Federated Identity: A Step-by-Step Modernization Framework appeared first on Security Boulevard. This article has been…
RSAC Innovation Sandbox | Token Security: Advocate of the Machine-First Identity Security Concept
Company Introduction Token Security[1] (see Figure 1) is a cybersecurity company focusing on the security of Agentic AI and Non-Human Identities (NHI). It is committed to building an “identity layer” that enables Agentic AI to land securely. As AI agents evolve…
Cryptographic Agility in Model Context Protocol Implementations
Learn how to implement cryptographic agility in Model Context Protocol (MCP) to protect AI infrastructure against quantum threats with PQC and modular security. The post Cryptographic Agility in Model Context Protocol Implementations appeared first on Security Boulevard. This article has…
Building Trust in AI SOC Analyst Solutions: A UK and EU CISO Perspective
By Brett Candon, VP International at Dropzone AI Trust has always been critical in security operations, but in the UK and Europe it carries significant regulatory weight. GDPR, NIS2 and similar related data‑protection frameworks shape far more than legal risk,…
Are scalable cloud-native security solutions the future
How Can Non-Human Identities Revolutionize Cloud Security? The question of how to effectively manage Non-Human Identities (NHIs) is gaining urgency where industries harness scalable, cloud-native security solutions. These NHIs, crucial to cyber, encompass machine identities powered by secrets like encrypted…
What optimization can be expected from AI-driven audits
How Are Non-Human Identities Redefining Cybersecurity? What are the implications of Non-Human Identities (NHIs) on contemporary cybersecurity strategies? Where increasingly reliant on digital, NHIs stand as crucial elements. These machine identities, which are becoming pivotal in securing environments, represent a…
How smart can Agentic AI become in protecting assets
Can Smart Agentic AI Revolutionize Asset Protection? How can organizations harness the power of Agentic AI to safeguard their most valuable assets? With industries continue to move operations to cloud-based environments, safeguarding digital assets against cyber threats is more crucial…
China-nexus Threat Actor Targets Persian Gulf Region With PlugX
IntroductionOn March 1, 2026, ThreatLabz observed new activity from a China-nexus threat actor targeting countries in the Persian Gulf region. The activity took place within the first 24 hours of the renewed conflict in the Middle East. The threat actor quickly…
When Proxies Become the Attack Vectors in Web Architectures
Many Reverse proxy attack vectors expose a flawed assumption in modern web architectures that backends can blindly trust security-critical headers from upstream reverse proxies. This assumption breaks down because HTTP RFC flexibility allows different servers to interpret the same headers…
Concepts of a Cyberplan
Three Pages to Secure the Nation? I’ve seen cocktail napkins with more substance than the White House cybersecurity “strategy” that just dropped. Three pages. Three. You could print it on the back of a diner menu between the pastrami special…
USENIX Security ’25 (Enigma Track) – • Inside Out: Security Designed With, Not For
Presenter: Kausalya Ganesh, Cisco Systems, Inc Our thanks to USENIX Security ’25 (Enigma Track) (USENIX ’25 for publishing their Creators, Authors and Presenter’s tremendous USENIX Security ’25 (Enigma Track) (USENIX ’25 content on the Organizations’ YouTube Channel. Permalink The post…
IO River Embraces Wasm to Enable Any WAF to Run on Any CDN
IO River this week revealed it is leveraging the portable WebAssembly (Wasm) binary instruction format to make it possible to deploy any web application firewall (WAF) on a content delivery network (CDN). Starting with running the Check Point WAF on…