MCLEAN, Va., Jan.15, 2026, CyberNewswire — A new Top 10 Cybersecurity Innovators profile by AppGuard has been released, spotlighting growing concerns over AI-enhanced malware. AI makes malware even more difficult to detect. Worse, they use AI to assess, adapt, and…
Category: Security Boulevard
News alert: BreachLock unveils agentic AI pen testing that mimics attacker behavior on web apps
NEW YORK, Jan. 15, 2026, CyberNewswire — BreachLock, a global leader in offensive security, today announced that its Adversarial Exposure Validation (AEV) solution now supports autonomous red teaming at the application layer, expanding beyond its initial network-layer capabilities introduced ……
How safe are your secrets with agentic AI handling them
How Secure Are Your Secrets When Managed by Non-Human Identities? What is the risk associated with non-human identities (NHIs) in cybersecurity? Understanding this concept is vital for the protection of your organization’s digital assets. NHIs—the machine identities in cybersecurity—have become…
Do AI-driven security systems empower compliance
Are Non-Human Identities the Missing Link in AI-Driven Security? Are traditional methods enough to protect our digital assets, or is there a growing need for more sophisticated approaches? With the advent of AI-driven security systems, the focus is turning towards…
Are AI managed NHIs reliable in identity management
What Are Non-Human Identities and Why Are They Critical in Cybersecurity? The concept of managing non-human identities (NHIs) is increasingly gaining traction. But what exactly are these NHIs, and why are they pivotal in securing modern digital infrastructures? Let’s delve…
How does Agentic AI deliver value in SOC operations
Are Organizations Maximizing the Value of Agentic AI in SOC Operations? Where security threats evolve with alarming speed, security operations centers (SOCs) must remain at the forefront of innovation. One intriguing advancement capturing the attention of cybersecurity professionals is Agentic…
NDSS 2025 – “Who Is Trying To Access My Account?”
Session 8D: Usability Meets Privacy Authors, Creators & Presenters: Tongxin Wei (Nankai University), Ding Wang (Nankai University), Yutong Li (Nankai University), Yuehuan Wang (Nankai University) PAPER “Who Is Trying To Access My Account?” Risk-based authentication (RBA) is gaining popularity and…
2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026
2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026 andrew.gertz@t… Thu, 01/15/2026 – 16:48 Nadav Avital | Senior Director of Threat Research at Thales More About This Author > 2025 was a year that tested how businesses think…
AI Security: What Enterprises Are Getting Wrong
The CSA Alliance has released their annual report on AI and security. Alan, Anton Chuvakin and Hillary Baron discuss the state of AI security and governance, how companies are actually adopting AI (both agentic and generative) and most importantly how…
The Next Security Battleground: Agentic Identity
Shahar Tal, CEO and co-founder of Cyata, discusses how the company is building the control plane for agentic identity. With deep roots in Israel’s Unit 8200 and Check Point, Cyata is tackling one of the next big security challenges: governing,…
We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster
The recently disclosed ServiceNow vulnerability should terrify every CISO in America. CVE-2025-12420, dubbed “BodySnatcher,” represents everything wrong with how we’re deploying AI in the enterprise today. An unauthenticated attacker—someone who has never logged into your system, sitting anywhere in the…
Report: Massive Amounts of Sensitive Data Being Shared with GenAI Tools
A new Harmonic Security report reveals a sharp rise in sensitive data shared with generative AI tools like ChatGPT, increasing the risk of security breaches, compliance violations, and data exposure across global organizations. The post Report: Massive Amounts of Sensitive…
Classroom Device Management: 8 Strategies for K-12 Success
Digital devices now shape daily instruction in K–12 classrooms. Laptops, tablets, and phones support research, collaboration in the classroom, and blended learning. Many schools also cater for bring your own device (BYOD) environments. These tools can unlock engagement and creativity,…
Delinea Acquries StrongDM to Secure Access to IT Infrastructure
Delinea announces the acquisition of StrongDM to enhance its privileged access management platform, offering just-in-time access for IT infrastructure and improving cybersecurity for human and non-human identities. The post Delinea Acquries StrongDM to Secure Access to IT Infrastructure appeared first…
Arcjet Python SDK Sinks Teeth Into Application-Layer Security
A new Arcjet SDK lets Python teams embed bot protection, rate limiting, and abuse prevention directly into application code. The post Arcjet Python SDK Sinks Teeth Into Application-Layer Security appeared first on Security Boulevard. This article has been indexed from…
What innovations do NHIs bring to cloud security
How Are Non-Human Identities Revolutionizing Cloud Security? What drives the evolution of cybersecurity? The answer often lies in the innovative management of non-human identities (NHIs). With the unprecedented surge in cloud adoption, the challenge of securing machine identities and their…
Can Agentic AI keep your data protection strategies ahead
How Can Advanced AI Strategies Transform Data Protection? How do organizations ensure that their data protection strategies remain cutting-edge and resilient against evolving threats? For many cybersecurity professionals, the key lies in harnessing the potential of Agentic AI. Advanced AI…
How do you trust a machine with secret management
How Do Organizations Ensure Machine Trust in Secret Management? How can organizations ensure that machines, which are increasingly handling vast amounts of sensitive data, can be trusted with secret management? With digital landscpe evolves, machine identities are taking center stage.…
Are NHIs scalable for growing tech ecosystems
How Does Non-Human Identity Management Enhance Scalability in Tech Ecosystems? Is your organization struggling to keep pace with the scalability demands of emerging tech? With technology grow and evolve, the role of Non-Human Identities (NHIs) in ensuring seamless operations becomes…
Microsoft, Law Enforcement Disrupt RedVDS Global Cybercrime Service
Microsoft and law enforcement agencies in Europe disrupted the operations of RedVDS, a global cybercrime service that sold cheap and disposable dedicated virtual servers to threat actors that used them to run BEC, phishing, and other fraud campaigns. The vendor…