Tidal Cyber is proud to announce the release of NARC AI (Natural Attack Reading and Comprehension), the first AI engine purpose-built to automatically extract adversary procedures and MITRE ATT&CK-aligned threat intelligence from unstructured reporting. The post Tidal Cyber Launches NARC:…
Category: Security Boulevard
How to Align with the NIST CSF 2.0 | Accelerating Growth with CyberStrong
For today’s enterprises, cybersecurity maturity is a key growth enabler. The organizations that thrive are those that treat cybersecurity not as a box to check, but as a business accelerator, an integrated part of strategic planning and performance. Aligning with…
The New Frontier of Cyber Threats: Unpacking Prompt Injection, Model Poisoning and Adversarial Attacks in AI Security
Artificial Intelligence is reshaping the cybersecurity landscape—and with it, a new generation of attack vectors is emerging. From prompt injection to model poisoning and adversarial attacks, threat actors are exploiting vulnerabilities unique to AI systems. This article explores how these…
Standing to Sue – The Elephant in the Room
When Elephant Insurance was hacked and millions of driver’s license numbers were exposed, the Fourth Circuit confronted a crucial privacy law dilemma: Is data theft alone enough to sue, or must harm be public and provable? This case exposes how…
BO7 boosting: Cross-platform, Game Pass & cloud logistics
A practical roadmap for BO7 boosting and Black Ops 7 services across Xbox, PlayStation, Battle.net, Steam, and the cloud—ownership, cross-save, and security. The post BO7 boosting: Cross-platform, Game Pass & cloud logistics appeared first on Security Boulevard. This article has…
OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy
In this episode, we explore OpenAI’s groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterprise security, and the risks it poses to privacy. Join hosts Tom Eston…
TDL 008 | Defending the Frontline: Ransomware, AI, and Real-World Lessons
Summary In this episode of “The Defender’s Log,” host David Redekop interviews Alexander Rau, a cybersecurity partner at KPMG, about the evolving incident response (IR) landscape. Rau notes that the past summer was exceptionally busy for IR, driven largely by…
Lightweight Open Source Identity Management Solutions for Home Labs
Discover lightweight, open-source identity management solutions perfect for securing your home lab. Compare Authelia, Authentik, and other tools to find the right fit. The post Lightweight Open Source Identity Management Solutions for Home Labs appeared first on Security Boulevard. This…
NDSS 2025 – BULKHEAD: Secure, Scalable, And Efficient Kernel Compartmentalization With PKS
SESSION Session 1D: System-Level Security Authors, Creators & Presenters: Yinggang Guo (State Key Laboratory for Novel Software Technology, Nanjing University; University of Minnesota), Zicheng Wang (State Key Laboratory for Novel Software Technology, Nanjing University), Weiheng Bai (University of Minnesota), Qingkai…
AI Meets Holidays: Helpful Tools, Best Deals and Security Tips
As we enter the holiday shopping season, more people are using AI tools and tips to shop for deals and protect themselves online. Here’s how. The post AI Meets Holidays: Helpful Tools, Best Deals and Security Tips appeared first on…
A Walk in the Park
In August of 2024 I stopped in my local book shop (shoutout to The Raven Bookstore) as I often do to browse the shelves and see if there was anything I couldn’t live without. A very colorful book jacket caught…
The Twilio-Stytch Acquisition: A Watershed Moment for Developer-First CIAM
Twilio acquiring Stytch signals a major shift in developer CIAM. I’ve analyzed 20+ platforms—from Descope to Keyclock—to show you which deliver on Auth0’s promise without the lock-in. OpenID standards, AI agent auth, and what actually matters when choosing your identity…
Reassuring Secrets Rotation for Compliance
How Do Non-Human Identities Impact Cloud Security? How do organizations ensure that their cloud are secure from potential threats? Non-Human Identities (NHIs) are critical components in cybersecurity, especially in cloud-based environments. These machine identities, essentially a combination of encrypted secrets…
Stay Relaxed with Enhanced Data Security
How Can Organizations Achieve Enhanced Data Security with Non-Human Identities? Have you ever wondered how modern organizations can achieve enhanced data security while maintaining efficient workflows? The management of Non-Human Identities (NHIs) plays a vital role in ensuring robust protection…
Powerful Tools to Manage Machine Identities
Why Are Non-Human Identities Critical in Cybersecurity? What happens when machine identities are not managed efficiently? Cybersecurity is rapidly transforming with increasing reliance on machine identities, also referred to as Non-Human Identities (NHIs). These identities are often overlooked but hold…
Preventing DNS filtering bypass by Encrypted DNS (DoT, DoH, DoQ)
DNS over HTTPS (DoH) and other encrypted DNS protocols like DNS over TLS (DoT) & DNS over QUIC (DoQ) enhances user privacy and security by encrypting DNS queries in transit, shielding them from eavesdropping, tampering, and censorship on untrusted networks.…
Defending DNS with Infoblox and Protective DNS
For too long, we’ve treated DNS as a simple utility. It’s just a phonebook for the internet, right? Treating it that way is a mistake. Nearly every single malicious action, whether it’s a phishing link, a command-and-control (C2) callback, or…
Randall Munroe’s XKCD ‘Hot Water Balloon”
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Hot Water Balloon” appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall…
From Visibility to Action: How AI and Automation Are Reshaping Enterprise Security
Alan speaks with Shailesh Athalye, senior vice president of product management at Qualys, about how AI, automation, and integrated platforms are redefining the way enterprises approach cybersecurity and risk management. Athalye notes that many organizations still operate in fragmented security…
Cyber Risk in Real Time: Lessons from the Front Lines
Alan and Kip Boyle, founder and chief information security officer at Cyber Risk Opportunities, discuss how organizations can rethink cybersecurity in terms of measurable risk rather than endless checklists and compliance frameworks. Boyle, a longtime cybersecurity leader and author, argues…