Author, Creator & Presenter: Dr. Johanna Sepúlveda PhD, Senior Expert and Technical Domain Manager for Quantum and Quantum-Secure Technologies, Airbus Defence and Space Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and…
Category: Security Boulevard
Is a CIAM Certification Beneficial?
Explore the pros & cons of CIAM certification for authentication & software development. Learn about career benefits, core skills validated, and how it compares to other certifications. The post Is a CIAM Certification Beneficial? appeared first on Security Boulevard. This…
News alert: SquareX exposes how AI browsers fall prey to OAuth hijacks and malware traps
PALO ALTO, Calif., Oct. 9, 2025, CyberNewswire — As AI Browsers rapidly gain adoption across enterprises, SquareX has released critical security research exposing major vulnerabilities that could allow attackers to exploit AI Browsers to exfiltrate sensitive data, distribute malware and…
Independent Verification of NHI Security: Necessary?
Why Is Independent Verification of Non-Human Identities Crucial for Cybersecurity? When it comes to cybersecurity, how often do organizations think about their machine identities, often overlooked yet vital for robust security protocols? The management of Non-Human Identities (NHIs) is increasingly…
How Safe Are Your Non-Human Identities Really?
Are You Harnessing the Full Potential of Non-Human Identities in Your Cloud Security Strategy? Non-human identities (NHIs) are revolutionizing the approach to cybersecurity strategy, particularly for organizations navigating the complexities of cloud environments. But what exactly are NHIs, and how…
USENIX 2025: PEPR ’25 – Using GenAI to Accelerate Privacy Implementations
Creators, Authors and Presenters: Rituraj Kirti, Software Engineer – Meta & Rajkishan Gunasekaran, Software Engineer – Meta Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX…
Randall Munroe’s XKCD ‘’Piercing”
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Piercing” appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall Munroe’s XKCD…
USENIX 2025: From Existential To Existing Risks Of Generative AI: A Taxonomy Of Who Is At Risk, What Risks Are Prevalent, And How They Arise
Creators, Authors and Presenters: Megan Li and Wendy Bickersteth, Carnegie Mellon University And In Collaboration With Ningjing Tang, Jason Hong, Hong Shen, Hoda Heidari, and Lorrie Cranor Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference…
What is CAA? Understanding Certificate Authority Authorization
Learn what a CAA record is, how it protects your domain from unauthorized SSL certificate issuance, and how to set it up for stronger website security. The post What is CAA? Understanding Certificate Authority Authorization appeared first on Security Boulevard.…
The Psychology of Security: Why Users Resist Better Authentication
70% of Americans feel overwhelmed by passwords, yet only half choose secure ones despite knowing the risks. The problem isn’t user education—it’s psychology. Discover why users resist better authentication and the UX design principles that make security feel human, not…
Multimodal AI, A Whole New Social Engineering Playground for Hackers
Multimodal AI delivers context-rich automation but also multiplies cyber risk. Hidden prompts, poisoned pixels, and cross-modal exploits can corrupt entire pipelines. Discover how attackers manipulate multimodal inputs—and the governance, testing, and incident response strategies CISOs need to stay ahead. The…
Red Pilling of Politics – Court Strikes Down California Law on Political Deepfakes
California’s AB 2655 aimed to fight AI-generated political deepfakes, but a federal court struck it down under Section 230, highlighting the clash between free speech and AI regulation. The post Red Pilling of Politics – Court Strikes Down California Law…
Shadow AI: Agentic Access and the New Frontier of Data Risk
As autonomous AI agents spread across enterprise systems, a new risk emerges: Shadow AI. Learn why traditional controls fail and how to secure agentic AI. The post Shadow AI: Agentic Access and the New Frontier of Data Risk appeared first…
How to Prepare for a Cloud Security Audit in Multi-Cloud and Hybrid Networks
Here is the easiest explanation! Cloud security audit are formal evaluations of an organization’s cloud environments to verify that security controls meet industry standards and regulatory requirements. As businesses are increasingly adopting multi-cloud and hybrid architectures, security audits have grown…
How to Build a Proactive Cybersecurity Monitoring Program for Modern Threats
Key Takeaways Cyber monitoring has become a core function for modern security teams, but collecting data alone isn’t enough. Effective cyber security monitoring requires a clear structure that ties strategy, data, and detection together into a single, coherent program. This…
Kasada Wins “e-Commerce Security Solution of the Year” in 2025 CyberSecurity Breakthrough Awards
Prestigious Global Awards Program Recognizes Innovative Security Products The post Kasada Wins “e-Commerce Security Solution of the Year” in 2025 CyberSecurity Breakthrough Awards appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…
USENIX 2025: PEPR ’25 – OneShield Privacy Guard: Deployable Privacy Solutions for LLMs
Creator, Author and Presenter: Shubhi Asthana, IBM Research Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ’25 – OneShield Privacy Guard: Deployable Privacy…
Rethinking DDoS Defense: Why Scale Isn’t the Only Metric That Matters
In recent months, headlines have drawn attention to record-breaking DDoS attacks, often measured in terabits per second (Tbps) and accompanied by declarations of network capacity in the hundreds of Tbps. These figures, while impressive, can create a misleading narrative about…
Anatomy of a Modern Threat: Deconstructing the Figma MCP Vulnerability
Threat researchers recently disclosed a severe vulnerability in a Figma Model Context Protocol (MCP) server, as reported by The Hacker News. While the specific patch is important, the discovery itself serves as a critical wake-up call for every organization rushing…
USENIX 2025: PEPR ’25 – Breaking Barriers, Not Privacy: Real-World Split Learning Across Healthcare Systems
Creator, Author and Presenter: Sravan Kumar Elineni Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ’25 – Breaking Barriers, Not Privacy: Real-World Split…