Category: Security Boulevard

SBOM is an investment in the future

There’s a saying I use often, usually as a joke, but it’s often painfully true. Past me hates future me. What I mean by that is it seems the person I used to be keeps making choices that annoy the…

How is the lifecycle of NHIs supported in enterprise environments?

Are You Effectively Managing Your Non-Human Identities? Cybersecurity professionals often grapple with a unique challenge—managing Non-Human Identities (NHIs) or machine identities. These identities, typically comprising secrets such as encrypted passwords, tokens, or keys, play a crucial role in modern enterprise…

How can Agentic AI be adaptable to regulatory changes?

Why Is Managing Non-Human Identities Essential in Cloud Security? Non-Human Identities (NHIs) play an instrumental role in modern cybersecurity frameworks. But what exactly constitutes an NHI, and why is its management vital in safeguarding our digital? Machine identities, known as…

What exciting advancements are coming in NHIs management?

How Does Non-Human Identity Management Shape Today’s Cybersecurity Landscape? Imagine where machines seamlessly interact with each other in a secure yet complex web of communication. How do we ensure the security of such vast and intricate structures? The answer lies…

The Death of Legacy MFA and What Must Rise in Its Place

Tycoon 2FA proves that the old promises of “strong MFA” came with fine print all along: when an attacker sits invisibly in the middle, your codes, pushes, and one-time passwords become their codes, pushes, and one-time passwords too. Tycoon 2FA:…

Shai-Hulud 2.0: over 14,000 secrets exposed

On November 24, a new wave of the Shai-Hulud supply chain attack emerged. The threat actors exfiltrate stolen credentials directly to GitHub repositories created with compromised tokens. GitGuardian identified 14,206 secrets across 487 organizations, with 2,485 still valid. The post…

Securing GenAI in Enterprises: Lessons from the Field

Enterprise GenAI success depends on more than models—security, observability, evaluation, and integration are critical to move from fragile pilots to reliable, scalable AI. The post Securing GenAI in Enterprises: Lessons from the Field appeared first on Security Boulevard. This article…

Signing In to Online Accounts

Explore secure methods for signing into online accounts, including SSO, MFA, and password management. Learn how CIAM solutions enhance security and user experience for enterprises. The post Signing In to Online Accounts appeared first on Security Boulevard. This article has…

Why should I feel confident in adopting Agentic AI tech?

How Secure Are Non-Human Identities in Today’s Cloud Environment? Are you confident in the security of non-human identities (NHIs) within your organization? With digital continues to expand, securing NHIs—machine identities consisting of encrypted credentials and permissions—becomes paramount. These identities, akin…