Hyperproof announced AI Guided Experiences at RSA Conference 2026, its latest push to use AI to reduce the manual effort at the core of compliance operations. The new capabilities move beyond search and summarization, which the company introduced in September…
Category: Security Boulevard
Securden Unveils Unified Identity Security Platform at RSAC 2026, Combining PAM, EPM, IGA, and More
Securden launched what it calls the world’s first truly unified identity security platform at RSA Conference 2026, consolidating privileged access management, endpoint privilege management, identity governance, cloud entitlement management, non-human identity security, and AI agent security into a single product.…
Azure APIM Signup Bypass: 97.9% of Developer Portals Still Exploitable Anonymously and from the Internet
The Azure APIM signup bypass is a critical vulnerability affecting 97.9% of internet-facing Developer Portals. Azure API Management (APIM) exposes APIs to external consumers through a Developer Portal, the interface where developers self-register, obtain API keys, and make API calls.…
Databricks Expands Into Cybersecurity with AI-Driven Lakewatch Platform
Databricks is moving into cybersecurity with the launch of Lakewatch, a new security platform that reflects the company’s focus on extending its data and AI capabilities into adjacent enterprise markets. The product, an open and AI-driven security information and event…
Swissbit Adds HID Seos to iShield Key 2, Previews PQC Platform and Face Biometrics at RSAC 2026
Swissbit is using RSAC 2026 to mark a series of real milestones for its iShield Key 2, the hardware security key the company launched last year as the first FIDO device to combine digital and physical access in a single…
News: AI-native Security Assurance leads the GRC Transformation
Enterprise CISOs are being asked to do more than ever. Their role is now two-fold: protector of the business and enabler of its growth. They need to reduce risk across a vast and changing digital environment, protect the business, satisfy…
News alert: DDoS attacks surge 150%—Gcore analysis shows faster, cheaper more frequent attacks
LUXEMBOURG, Luxembourg, March 24, 2026, CyberNewswire— Gcore, the global infrastructure and software provider for AI, cloud, network, and security solutions, today announced the findings of its Q3-Q4 2025 Gcore Radar report DDoS attack trends. The report reveals growing attack … (more…)…
Utimaco Survey: 78% of US Companies Say Data Breaches Are the Top GenAI Risk, But Most Haven’t Acted
Companies know they have a problem with generative AI and quantum security. They just haven’t done much about it yet. That’s the upshot of Utimaco’s 2026 Digital Trust Report, a commissioned study of 250 large U.S. companies released at RSAC…
KnowBe4 Expands AIDA to Eight AI Agents at RSAC 2026, Targeting Fully Autonomous Human Risk Management
KnowBe4 is leaning hard into autonomous AI at RSAC 2026, using the conference to spotlight an expanding suite of AI agents it says is reducing security administration from hours to seconds. The company’s AIDA platform, short for Artificial Intelligence Defense…
CSA and Aembit Survey: 68% of Organizations Can’t Distinguish AI Agent Actions from Human Activity
AI agents are already deployed broadly across enterprise environments. The problem is that organizations can’t tell what they’re doing. That’s the core finding of a new survey report released at RSAC 2026 by the Cloud Security Alliance, commissioned by Aembit.…
Introducing Castle’s Research Team
How we think about research at Castle Bot detection and fraud prevention are adversarial by default. It is a cat-and-mouse game: attackers iterate, defenders respond, and the cycle keeps moving. AI has accelerated this dynamic on both sides. Attackers use…
Trivy’s March Supply Chain Attack Shows Where Secret Exposure Hurts Most
The Trivy story is moving quickly, and the latest reporting makes one thing clear: this is no longer just a GitHub Actions tag hijack. What started as a compromise of trivy-action, setup-trivy, and the v0.69.4 release has expanded into malicious…
How Watchdog Cyber Scaled DMARC Services and Client Growth with EasyDMARC
Originally published at How Watchdog Cyber Scaled DMARC Services and Client Growth with EasyDMARC by Sona Mirzoyan. About the Partner Company: Watchdog Cyber Headquarters: Spring … The post How Watchdog Cyber Scaled DMARC Services and Client Growth with EasyDMARC appeared…
How to Enroll a Code Signing Certificate in Sectigo Certificate Manager?
The process for allowing organizations to securely create and manage certificates to digitally sign software via a Code Signing Certificate enrollment process within SCM (Sectigo Certificate Manager) is provided in this guide. This guide tells about the entire enrollment process…
OWASP Top 10 Risks for Agentic Applications: Must-Know Risks
The rapid evolution of AI has moved us beyond simple chatbots into the era of agentic applications, systems that can plan, reason, and act autonomously across multiple steps. From finance and healthcare to cybersecurity and DevOps, these agents are no…
The Tut of Superiority
I’m in Antwerp, Belgium to attend CyberNova. European travel is nice. As my friend Erich says, “you fall over in Europe and land in another country” which isn’t wrong. It takes me longer to get to the airport than the…
AI Governance in 2026: Why Staying Current Is No Longer Optional for Your Business
AI Governance in 2026: Why Staying Current Is No Longer Optional for Your Business You deployed an AI tool to screen job applicants six months ago. Maybe you used ChatGPT to draft customer communications. Perhaps your product team quietly integrated…
RSA 2026 – AI Oozing Out of Every Pore
Here at RSA, the hype is on “high”, including dune buggies driving the streets wrapped in high-tech banners claiming to have solved all things AI. Even before you get downtown you are greeted at the airport with big budget AI…
Automated Cryptographic Agility Frameworks for AI Resource Orchestration
Learn how automated cryptographic agility frameworks protect AI resource orchestration and MCP deployments against quantum threats and tool poisoning. The post Automated Cryptographic Agility Frameworks for AI Resource Orchestration appeared first on Security Boulevard. This article has been indexed from…
Dataminr Launches Cyber Defense Suite That Fuses External Threat Signals With Internal Telemetry
Dataminr used RSAC 2026 to roll out Dataminr for Cyber Defense, a new product suite the company says is designed to move security teams from alert-driven response to preemptive, risk-prioritized action. The suite aims to combine Dataminr’s real-time event and…