Category: Security Boulevard

How safe are your secrets with agentic AI handling them

How Secure Are Your Secrets When Managed by Non-Human Identities? What is the risk associated with non-human identities (NHIs) in cybersecurity? Understanding this concept is vital for the protection of your organization’s digital assets. NHIs—the machine identities in cybersecurity—have become…

Do AI-driven security systems empower compliance

Are Non-Human Identities the Missing Link in AI-Driven Security? Are traditional methods enough to protect our digital assets, or is there a growing need for more sophisticated approaches? With the advent of AI-driven security systems, the focus is turning towards…

Are AI managed NHIs reliable in identity management

What Are Non-Human Identities and Why Are They Critical in Cybersecurity? The concept of managing non-human identities (NHIs) is increasingly gaining traction. But what exactly are these NHIs, and why are they pivotal in securing modern digital infrastructures? Let’s delve…

How does Agentic AI deliver value in SOC operations

Are Organizations Maximizing the Value of Agentic AI in SOC Operations? Where security threats evolve with alarming speed, security operations centers (SOCs) must remain at the forefront of innovation. One intriguing advancement capturing the attention of cybersecurity professionals is Agentic…

NDSS 2025 – “Who Is Trying To Access My Account?”

Session 8D: Usability Meets Privacy Authors, Creators & Presenters: Tongxin Wei (Nankai University), Ding Wang (Nankai University), Yutong Li (Nankai University), Yuehuan Wang (Nankai University) PAPER “Who Is Trying To Access My Account?” Risk-based authentication (RBA) is gaining popularity and…

AI Security: What Enterprises Are Getting Wrong

The CSA Alliance has released their annual report on AI and security. Alan, Anton Chuvakin and Hillary Baron discuss the state of AI security and governance, how companies are actually adopting AI (both agentic and generative) and most importantly how…

The Next Security Battleground: Agentic Identity

Shahar Tal, CEO and co-founder of Cyata, discusses how the company is building the control plane for agentic identity. With deep roots in Israel’s Unit 8200 and Check Point, Cyata is tackling one of the next big security challenges: governing,…

Classroom Device Management: 8 Strategies for K-12 Success

Digital devices now shape daily instruction in K–12 classrooms. Laptops, tablets, and phones support research, collaboration in the classroom, and blended learning. Many schools also cater for bring your own device (BYOD) environments. These tools can unlock engagement and creativity,…

Delinea Acquries StrongDM to Secure Access to IT Infrastructure

Delinea announces the acquisition of StrongDM to enhance its privileged access management platform, offering just-in-time access for IT infrastructure and improving cybersecurity for human and non-human identities. The post Delinea Acquries StrongDM to Secure Access to IT Infrastructure appeared first…

What innovations do NHIs bring to cloud security

How Are Non-Human Identities Revolutionizing Cloud Security? What drives the evolution of cybersecurity? The answer often lies in the innovative management of non-human identities (NHIs). With the unprecedented surge in cloud adoption, the challenge of securing machine identities and their…

Can Agentic AI keep your data protection strategies ahead

How Can Advanced AI Strategies Transform Data Protection? How do organizations ensure that their data protection strategies remain cutting-edge and resilient against evolving threats? For many cybersecurity professionals, the key lies in harnessing the potential of Agentic AI. Advanced AI…

How do you trust a machine with secret management

How Do Organizations Ensure Machine Trust in Secret Management? How can organizations ensure that machines, which are increasingly handling vast amounts of sensitive data, can be trusted with secret management? With digital landscpe evolves, machine identities are taking center stage.…

Are NHIs scalable for growing tech ecosystems

How Does Non-Human Identity Management Enhance Scalability in Tech Ecosystems? Is your organization struggling to keep pace with the scalability demands of emerging tech? With technology grow and evolve, the role of Non-Human Identities (NHIs) in ensuring seamless operations becomes…