In our opinion, Gartner’s 2026 research reflects this broader evolution. Identity has expanded beyond perimeter controls and point-in-time authentication to encompass verification of the human, contextual risk assessment, and automated trust decisions. The post The 2026 CISO Mandate: Proactive, Passwordless,…
Category: Security Boulevard
Early 2026 is Proving KasadaIQ’s AI Predictions
AI agents have moved from experimental to operational. Now security teams must verify agent identity, intent, and trust before automation becomes exploitation. The post Early 2026 is Proving KasadaIQ’s AI Predictions appeared first on Security Boulevard. This article has been…
Analysis: Root Cause of Most Security Incidents Traced to Unpatched Firewalls
An analysis of more than two trillion IT events collected during 2025 by Barracuda Networks finds 90% of ransomware incidents exploited firewalls via unpatched software or a vulnerable account that enables cybercriminals to gain access to an IT environment. Merium…
NDSS 2025 – Translating C To Rust: Lessons From A User Study
Session 13D: Software Security: Code and Compiler Authors, Creators & Presenters: Ruishi Li (National University of Singapore), Bo Wang (National University of Singapore), Tianyu Li (National University of Singapore), Prateek Saxena (National University of Singapore), Ashish Kundu (Cisco Research) PAPER…
Life in the Swimlane with Chris Mallow, Partner Solutions Architect
The post Life in the Swimlane with Chris Mallow, Partner Solutions Architect appeared first on AI Security Automation. The post Life in the Swimlane with Chris Mallow, Partner Solutions Architect appeared first on Security Boulevard. This article has been indexed…
The AI Agent Identity Crisis: 80% of Agents Don’t Properly Identify Themselves, 80% of Sites Don’t Verify
AI agent identity verification fails at both ends. DataDome tested 698,000 sites—80% couldn’t detect spoofed ChatGPT traffic. Here’s why. The post The AI Agent Identity Crisis: 80% of Agents Don’t Properly Identify Themselves, 80% of Sites Don’t Verify appeared first…
APT37 Adds New Capabilities for Air-Gapped Networks
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign, tracked as Ruby Jumper by ThreatLabz, APT37 uses Windows shortcut (LNK) files…
What to Know About the Notepad++ Supply-Chain Attack
The cybersecurity community is still grappling with a sobering realization: one of the most ubiquitous tools in the developer’s toolkit, Notepad++, was hiding a critical vulnerability for over six months. The post What to Know About the Notepad++ Supply-Chain Attack…
Shifting Security Left for AI Agents: Enforcing AI-Generated Code Security with GitGuardian MCP
In this article, we will explore the hot topic of securing AI-generated code and demonstrate a technical approach to shifting security left for cloud AI agents by using Model Context Protocol (MCP) tools. The post Shifting Security Left for AI…
Accelerate Secure Releases With Microsoft Copilot and Sonatype Guide
AI coding assistants, such as Microsoft Copilot, are fundamentally transforming the process of software development. Developers can generate scaffolding, draft functions, update dependencies, and even build full applications in seconds. The speed is real, and so is the productivity boost.…
What is Polymorphic Malware?
Malware continues to evolve, becoming more sophisticated and harder to detect. One of the most challenging types is polymorphic malware — malicious software that constantly changes its code to evade detection by traditional security systems. In a world where cyber…
How the CISO’s Role is Evolving From Technologist to Chief Educator
Today’s CISO is a strategic leader responsible for risk communication, security culture, education, and executive alignment. Technical expertise remains essential, but influence, clarity, and leadership now define success. The post How the CISO’s Role is Evolving From Technologist to Chief Educator appeared…
How to Prepare Your Business Before Implementing Enterprise SSO
Learn how to prepare your business for enterprise SSO implementation, from identity audits to security policies and system readiness. The post How to Prepare Your Business Before Implementing Enterprise SSO appeared first on Security Boulevard. This article has been indexed…
Is Your AppSec Program Truly Mature?
Learn how to build a high-maturity Application Security program with secure SDLC, developer-first practices, automated AppSec controls, practical threat modeling, runtime API protection, and meaningful security metrics. The post Is Your AppSec Program Truly Mature? appeared first on Security Boulevard.…
AI-Driven Behavioral Heuristics for Quantum-Era Threat Detection
Explore how AI-driven behavioral heuristics and post-quantum security protect Model Context Protocol (MCP) deployments from advanced AI-age threats. The post AI-Driven Behavioral Heuristics for Quantum-Era Threat Detection appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
AI Shocks the Cybersecurity Market
The cybersecurity market was jolted last week after Anthropic dropped a bombshell announcement. The company’s new AI Claude model identified 500 previously unknown high-risk vulnerabilities hidden in widely used software. That is not a minor milestone. It is a…
Is the investment in Agentic AI justified by its cybersecurity benefits
How Can Non-Human Identities Strengthen Cybersecurity? Are organizations truly leveraging the full potential of Non-Human Identities (NHIs) in their quest for robust cybersecurity? With cybersecurity threats continue to evolve, there’s a pressing need to adopt innovative solutions that go beyond…
How does Agentic AI help you stay ahead in cybersecurity
The Role of Agentic AI in Modern Cybersecurity Are you exploring the future trends making waves in cybersecurity today? One transformative technology, Agentic AI, is reshaping how organizations manage Non-Human Identities (NHI) and Secrets Security Management, allowing businesses to stay…
Why are tech leaders excited about NHI in cybersecurity
What is Driving the Buzz Among Tech Leaders Over Non-Human Identities in Cybersecurity? Cybersecurity is evolving at an unprecedented pace, and amidst the dynamic shifts, Non-Human Identities (NHIs) have emerged as a pivotal component that tech leaders are increasingly excited…
How does Agentic AI deliver value in cloud-native security
What Drives the Need for Non-Human Identity Management in Cloud-Native Security? How are organizations managing the security risks associated with non-human identities (NHIs) in their cloud environments? With digital transformation advances, the complexity and quantity of machine identities surpass human…