Category: Security Boulevard

Reorient Your Thinking to Tackle AI Security Risks

The rise of artificial intelligence has rendered portions of your current cybersecurity playbook obsolete. Unless Chief Information Security Officers (CISOs) act quickly to reorient their thinking, they may be unaware of and unprepared to face emerging AI-related threats. Learn how…

ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data

Several threat clusters are using vishing in extortion campaigns that include tactics that are consistent with those used by high-profile threat group ShinyHunters. They are stealing SSO and MFA credentials to access companies’ environments and steal data from cloud applications,…

AI Agent Orchestration: How It Works and Why It Matters

AI agent orchestration is reshaping how businesses build intelligent systems. It moves beyond single chatbots or generative interfaces, coordinating multiple specialized AI agents to complete…Read More The post AI Agent Orchestration: How It Works and Why It Matters appeared first…

StrongestLayer: Top ‘Trusted’ Platforms are Key Attack Surfaces

Explore StrongestLayer’s threat intelligence report highlighting the rise of email security threats exploiting trusted platforms like DocuSign and Google Calendar. Learn how organizations can adapt to defend against these evolving cyber risks. The post StrongestLayer: Top ‘Trusted’ Platforms are Key…

Why Gen Z is Ditching Smartphones for Dumbphones

Younger generations are increasingly ditching smartphones in favor of “dumbphones”—simpler devices with fewer apps, fewer distractions, and less tracking. But what happens when you step away from a device that now functions as your wallet, your memory, and your security…

Web Single Sign-on with WS-Federation

Deep dive into Web Single Sign-on with WS-Federation. Learn how to implement secure federated identity, manage STS, and bridge legacy apps with modern CIAM. The post Web Single Sign-on with WS-Federation appeared first on Security Boulevard. This article has been…

OAuth User-Managed Access Protocol Overview

Deep dive into OAuth User-Managed Access (UMA) for CTOs. Learn how UMA 2.0 improves CIAM, delegated authorization, and enterprise SSO security. The post OAuth User-Managed Access Protocol Overview appeared first on Security Boulevard. This article has been indexed from Security…

How powerful is AI in managing non-human identities

How Can Organizations Secure Machine Identities? Did you know that non-human identities (NHIs) are increasingly becoming a critical component of cybersecurity infrastructure across various sectors? As much as 68% of IT security incidents involve machine identities, highlighting the urgent need…

Can Agentic AI handle complex cloud-native security tasks

How Do Non-Human Identities Fit into Cloud-Native Security? Is your current cybersecurity strategy equipped to handle the complexities posed by cloud-native environments and machine identities? Cloud computing’s rapid growth has invited a unique set of security challenges that organizations must…

Are cloud secrets safe with automatic rotation systems

Are Cloud Secrets Truly Secure with Automated Rotation Systems? What assures you that your cloud secrets are safe? Where organizations increasingly migrate operations to the cloud, safeguarding machine identities—referred to as Non-Human Identities (NHIs)—becomes paramount. These NHIs are the machine…

What new technologies are boosting Agentic AI capabilities

How Are Non-Human Identities Revolutionizing Cybersecurity? Did you know that machine identities, also known as Non-Human Identities (NHIs), are becoming pivotal? With digital continues to expand, the need for robust security measures grows in parallel. NHIs, a crucial component, are…

AI-powered penetration testing: Definition, Tools and Process

AI-powered penetration testing is an advanced approach to security testing that uses artificial intelligence, machine learning, and autonomous agents to simulate real-world cyberattacks, identify vulnerabilities, and assess exploitability faster and more intelligently than traditional manual testing. According to Mariia Kozlovska…

Blockchain Penetration Testing: Definition, Process, and Tools

Blockchain Penetration Testing simulates real-world cyberattacks on blockchain systems to identify vulnerabilities before attackers can exploit them.  On September 14, 2021, the Solana blockchain network went offline for 17 hours during the Grape Protocol IDO (Initial DEX Offering) due to…

NDSS 2025 – PropertyGPT

Session 11A: Blockchain Security 2 Authors, Creators & Presenters: Ye Liu (Singapore Management University), Yue Xue (MetaTrust Labs), Daoyuan Wu (The Hong Kong University of Science and Technology), Yuqiang Sun (Nanyang Technological University), Yi Li (Nanyang Technological University), Miaolei Shi…

Friday Squid Blogging: New Squid Species Discovered

A new species of squid. pretends to be a plant: Scientists have filmed a never-before-seen species of deep-sea squid burying itself upside down in the seafloor—a behavior never documented in cephalopods. They captured the bizarre scene while studying the depths…