Queen City Con 2025 highlighted identity, cloud risk, and detection gaps. Learn why defaults and identity sprawl, not zero-days, are still the greatest security threat. The post Queen City Con 0x3: Hacking And Embracing Resiliency appeared first on Security Boulevard.…
Category: Security Boulevard
Commvault Extends AI Ability to Ensure Cyber Resilience
Commvault today extended the reach and scope of its data protection portfolio as part of an effort to enable IT organizations to achieve and maintain resiliency. Announced at its SHIFT 2025 event, these additions are part of a Commvault Cloud…
How to Build a Strong Ransomware Defense Strategy for Your Organization?
Ransomware attacks increased by 149% in 2025, within the U.S. alone. Organizations have paid millions in ransom and recovery costs, making ransomware attacks one of the most financially debilitating cyberattacks. To ensure that your organization can prevent or at least…
The Learning Counsel: 3 Steps to a Robust Zero-Trust Architecture in K-12 Schools This Year
This article was originally published in The Learning Counsel on 11/5/25 by Charlie Sander. It’s time for district leaders to turn your attention to cybersecurity strategy As the buzz around back-to-school season subsides and teachers and students fall into the…
Intel Sues Ex-Employee It Claims Stole 18,000 Company Files
Intel is suing a former employee who the chipmaker claims downloaded almost 18,000 corporate files days before leaving the company. The software engineer was told he was being let go effective July 31, likely part of Intel’s larger effort to…
NSFOCUS Monthly APT Insights – September 2025
Regional APT Threat Situation In September 2025, the global threat hunting system of Fuying Lab detected a total of 24 APT attack activities. These activities were primarily concentrated in regions including East Asia, South Asia, as shown in the following…
The Future of AI in Security: From Reactive to Proactive Protection
Explore how AI is transforming cybersecurity from reactive threat response to proactive, predictive protection — while addressing ethics, privacy, and the human-AI balance. The post The Future of AI in Security: From Reactive to Proactive Protection appeared first on Security…
Bringing AI to the SOC is not Intended to Replace Humans
Learn how to transform your traditional SOC into an AI-powered security hub with multi-agent collaboration, contextual intelligence, and business risk–driven insights. The post Bringing AI to the SOC is not Intended to Replace Humans appeared first on Security Boulevard. This…
An Overview of Qualified Digital Certificates
Explore qualified digital certificates, their role in authentication, and how they bolster security in software development. Understand the technical and legal aspects. The post An Overview of Qualified Digital Certificates appeared first on Security Boulevard. This article has been indexed…
Improving Single Sign-On Experiences with OpenID Connect and SCIM
Learn how to improve single sign-on (SSO) experiences using OpenID Connect (OIDC) and SCIM for streamlined authentication and user management. The post Improving Single Sign-On Experiences with OpenID Connect and SCIM appeared first on Security Boulevard. This article has been…
From Firewalls to the Cloud: Unifying Security Policies Across Hybrid Environments
When your infrastructure spans firewalls, SD-WAN, containers, and multiple clouds, “secure” starts to mean a dozen different things. Each environment has its own controls, policies, and interfaces. Each team has… The post From Firewalls to the Cloud: Unifying Security Policies…
The Limitations of Google Play Integrity API (ex SafetyNet)
Updated November 2025 This overview outlines the history and use of Google Play Integrity API and highlights some limitations. We also compare and contrast Google Play Integrity API with the comprehensive mobile security offered by Approov. The imminent deprecation of…
Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215)
5Critical 58Important 0Moderate 0Low Microsoft addresses 63 CVEs including one zero-day vulnerability which was exploited in the wild. Microsoft patched 63 CVEs in its November 2025 Patch Tuesday release, with five rated critical, and 58 rated as important. This month’s…
Compliance-Ready Auth Without Enterprise Bloat
Compliance-Ready Auth Without Enterprise Bloat The post Compliance-Ready Auth Without Enterprise Bloat appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Compliance-Ready Auth Without Enterprise Bloat
Introduction to REST API Security – FireTail Blog
Nov 11, 2025 – Jeremy Snyder – A common analogy for APIs is that they are LEGO blocks, or more specifically, APIs are the little studs and slots that allow you to attach LEGO pieces to each other and build…
FireTail CEO, Jeremy Snyder, Set to Present at UK Cyber Week 2023 – FireTail Blog
Nov 11, 2025 – Jeremy Snyder – On April 5, 2023, during UK Cyber Week, our CEO Jeremy Snyder will present, “API security – what is it, why you should care, and how to protect your org”. The session, part…
FireTail Names Timo Rüppell as Vice President of Product – FireTail Blog
Nov 11, 2025 – Jeremy Snyder – McLean, Va. – Jan. 24, 2023 – FireTail Inc., a disruptor in API security, today announced the appointment of Timo Rüppell to the executive leadership team as Vice President of Product. In conjunction…
CYFIRMA & FireTail: Working Together for Complete Visibility and Robust API Security – FireTail Blog
Nov 11, 2025 – Alan Fagan – CYFIRMA is an external threat landscape management platform that combines cyber intelligence with attack surface discovery and digital risk protection to deliver early warning, personalized, contextual, outside-in, and multi-layered insights. The company’s cloud-based…
API Security: Bridging the Gap Between Application and Security Teams – FireTail Blog
Nov 11, 2025 – Jeremy Snyder – API Security: Why the Gap Developers and security professionals have different concerns and motivations. It’s easy to see why gaps emerge. The ability to quickly ship new products, features or functionality is a…
Application Attack Patterns: Attack Graphs Reveal 81 Threats Your Tools Miss
TL;DR Applications face thousands of attack attempts monthly, yet traditional security tools miss the ones that matter most. New data from Contrast Security reveals that while WAFs, EDR, and SIEM platforms excel at their designed functions, they cannot see inside…