Traditional firewalls can’t stop modern DDoS attacks. Learn why high-volume, multi-layer attacks overwhelm perimeter defenses—and how to build real DDoS resilience. The post Why Traditional Firewalls Fail Against Today’s High-Volume DDoS Attacks appeared first on Security Boulevard. This article has…
Category: Security Boulevard
Inside the Rise of the Always Watching, Always Learning Enterprise Defense System
Perimeter security is obsolete. Modern cyberresilience demands zero-trust, continuous verification, and intelligent automation that detects and contains threats before damage occurs. The post Inside the Rise of the Always Watching, Always Learning Enterprise Defense System appeared first on Security Boulevard.…
From Quantum Resilience to Identity Fatigue: Three Trends Shaping Print Security in 2026
From quantum resilience to identity fatigue, print security is emerging as a critical risk in 2026. Learn the three trends forcing organizations to rethink printer and edge-device security. The post From Quantum Resilience to Identity Fatigue: Three Trends Shaping Print Security in 2026 appeared…
Detecting forged browser fingerprints for bot detection, lessons from LinkedIn
In my previous post, I showed how LinkedIn detects browser extensions as part of its client-side fingerprinting strategy. That post did surprisingly well, maybe because people enjoy reading about LinkedIn on LinkedIn. So I decided to take another look at…
AI Breach Case Studies: Lessons for CISOs – FireTail Blog
Jan 16, 2026 – Alan Fagan – AI Breach Case Studies: Lessons for CISOsQuick Facts: AI Security BreachesThe threat landscape isn’t what it used to be: AI breaches are happening right now, driven by real-world vectors like prompt injections, model…
RSAC Stands Tall Appointing a True Leader, Jen Easterly as CEO
RSAC just made a power move. With Jen Easterly stepping in as CEO, the cybersecurity industry’s front porch gets real leadership, real credibility, and real intent—writes Alan. The post RSAC Stands Tall Appointing a True Leader, Jen Easterly as CEO…
Your Android App Needs Scanning – Best Android App Vulnerability Scanner in 2026
Given the threat-dominating space we cannot escape, we need a game-changer that becomes the ultimate tool for protecting our Android app. Now, imagine your organisation’s application is used by hundreds and thousands of Android users, given that your flagship Android…
News alert: AppGuard reopens insider program as AI-enhanced malware outpaces detection defenses
MCLEAN, Va., Jan.15, 2026, CyberNewswire — A new Top 10 Cybersecurity Innovators profile by AppGuard has been released, spotlighting growing concerns over AI-enhanced malware. AI makes malware even more difficult to detect. Worse, they use AI to assess, adapt, and…
News alert: BreachLock unveils agentic AI pen testing that mimics attacker behavior on web apps
NEW YORK, Jan. 15, 2026, CyberNewswire — BreachLock, a global leader in offensive security, today announced that its Adversarial Exposure Validation (AEV) solution now supports autonomous red teaming at the application layer, expanding beyond its initial network-layer capabilities introduced ……
How safe are your secrets with agentic AI handling them
How Secure Are Your Secrets When Managed by Non-Human Identities? What is the risk associated with non-human identities (NHIs) in cybersecurity? Understanding this concept is vital for the protection of your organization’s digital assets. NHIs—the machine identities in cybersecurity—have become…
Do AI-driven security systems empower compliance
Are Non-Human Identities the Missing Link in AI-Driven Security? Are traditional methods enough to protect our digital assets, or is there a growing need for more sophisticated approaches? With the advent of AI-driven security systems, the focus is turning towards…
Are AI managed NHIs reliable in identity management
What Are Non-Human Identities and Why Are They Critical in Cybersecurity? The concept of managing non-human identities (NHIs) is increasingly gaining traction. But what exactly are these NHIs, and why are they pivotal in securing modern digital infrastructures? Let’s delve…
How does Agentic AI deliver value in SOC operations
Are Organizations Maximizing the Value of Agentic AI in SOC Operations? Where security threats evolve with alarming speed, security operations centers (SOCs) must remain at the forefront of innovation. One intriguing advancement capturing the attention of cybersecurity professionals is Agentic…
NDSS 2025 – “Who Is Trying To Access My Account?”
Session 8D: Usability Meets Privacy Authors, Creators & Presenters: Tongxin Wei (Nankai University), Ding Wang (Nankai University), Yutong Li (Nankai University), Yuehuan Wang (Nankai University) PAPER “Who Is Trying To Access My Account?” Risk-based authentication (RBA) is gaining popularity and…
2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026
2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026 andrew.gertz@t… Thu, 01/15/2026 – 16:48 Nadav Avital | Senior Director of Threat Research at Thales More About This Author > 2025 was a year that tested how businesses think…
AI Security: What Enterprises Are Getting Wrong
The CSA Alliance has released their annual report on AI and security. Alan, Anton Chuvakin and Hillary Baron discuss the state of AI security and governance, how companies are actually adopting AI (both agentic and generative) and most importantly how…
The Next Security Battleground: Agentic Identity
Shahar Tal, CEO and co-founder of Cyata, discusses how the company is building the control plane for agentic identity. With deep roots in Israel’s Unit 8200 and Check Point, Cyata is tackling one of the next big security challenges: governing,…
We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster
The recently disclosed ServiceNow vulnerability should terrify every CISO in America. CVE-2025-12420, dubbed “BodySnatcher,” represents everything wrong with how we’re deploying AI in the enterprise today. An unauthenticated attacker—someone who has never logged into your system, sitting anywhere in the…
Report: Massive Amounts of Sensitive Data Being Shared with GenAI Tools
A new Harmonic Security report reveals a sharp rise in sensitive data shared with generative AI tools like ChatGPT, increasing the risk of security breaches, compliance violations, and data exposure across global organizations. The post Report: Massive Amounts of Sensitive…
Classroom Device Management: 8 Strategies for K-12 Success
Digital devices now shape daily instruction in K–12 classrooms. Laptops, tablets, and phones support research, collaboration in the classroom, and blended learning. Many schools also cater for bring your own device (BYOD) environments. These tools can unlock engagement and creativity,…