Deep dive into Web Single Sign-on with WS-Federation. Learn how to implement secure federated identity, manage STS, and bridge legacy apps with modern CIAM. The post Web Single Sign-on with WS-Federation appeared first on Security Boulevard. This article has been…
Category: Security Boulevard
OAuth User-Managed Access Protocol Overview
Deep dive into OAuth User-Managed Access (UMA) for CTOs. Learn how UMA 2.0 improves CIAM, delegated authorization, and enterprise SSO security. The post OAuth User-Managed Access Protocol Overview appeared first on Security Boulevard. This article has been indexed from Security…
How powerful is AI in managing non-human identities
How Can Organizations Secure Machine Identities? Did you know that non-human identities (NHIs) are increasingly becoming a critical component of cybersecurity infrastructure across various sectors? As much as 68% of IT security incidents involve machine identities, highlighting the urgent need…
Can Agentic AI handle complex cloud-native security tasks
How Do Non-Human Identities Fit into Cloud-Native Security? Is your current cybersecurity strategy equipped to handle the complexities posed by cloud-native environments and machine identities? Cloud computing’s rapid growth has invited a unique set of security challenges that organizations must…
Are cloud secrets safe with automatic rotation systems
Are Cloud Secrets Truly Secure with Automated Rotation Systems? What assures you that your cloud secrets are safe? Where organizations increasingly migrate operations to the cloud, safeguarding machine identities—referred to as Non-Human Identities (NHIs)—becomes paramount. These NHIs are the machine…
What new technologies are boosting Agentic AI capabilities
How Are Non-Human Identities Revolutionizing Cybersecurity? Did you know that machine identities, also known as Non-Human Identities (NHIs), are becoming pivotal? With digital continues to expand, the need for robust security measures grows in parallel. NHIs, a crucial component, are…
NDSS 2025 – Alba: The Dawn Of Scalable Bridges For Blockchains
Session 11A: Blockchain Security 2 Authors, Creators & Presenters: Giulia Scaffino (TU Wien), Lukas Aumayr (TU Wien), Mahsa Bastankhah (Princeton University), Zeta Avarikioti (TU Wien), Matteo Maffei (TU Wien) PAPER Alba: The Dawn of Scalable Bridges for Blockchains Over the…
After TikTok: Navigating the Complex Web of Foreign Tech Bans
As federal and state governments extend their lists of banned foreign technologies, where is this trend heading next? Is your home network safe for work use? The post After TikTok: Navigating the Complex Web of Foreign Tech Bans appeared first…
AI-powered penetration testing: Definition, Tools and Process
AI-powered penetration testing is an advanced approach to security testing that uses artificial intelligence, machine learning, and autonomous agents to simulate real-world cyberattacks, identify vulnerabilities, and assess exploitability faster and more intelligently than traditional manual testing. According to Mariia Kozlovska…
Blockchain Penetration Testing: Definition, Process, and Tools
Blockchain Penetration Testing simulates real-world cyberattacks on blockchain systems to identify vulnerabilities before attackers can exploit them. On September 14, 2021, the Solana blockchain network went offline for 17 hours during the Grape Protocol IDO (Initial DEX Offering) due to…
NDSS 2025 – PropertyGPT
Session 11A: Blockchain Security 2 Authors, Creators & Presenters: Ye Liu (Singapore Management University), Yue Xue (MetaTrust Labs), Daoyuan Wu (The Hong Kong University of Science and Technology), Yuqiang Sun (Nanyang Technological University), Yi Li (Nanyang Technological University), Miaolei Shi…
We Keep Hearing the Same Question: Morpheus (AI SOC) vs. Traditional SOAR
SOC teams keep asking how the AI SOC differs from traditional SOAR. Here’s what Morpheus does differently—from integration maintenance to false negatives. The post We Keep Hearing the Same Question: Morpheus (AI SOC) vs. Traditional SOAR appeared first on D3…
Friday Squid Blogging: New Squid Species Discovered
A new species of squid. pretends to be a plant: Scientists have filmed a never-before-seen species of deep-sea squid burying itself upside down in the seafloor—a behavior never documented in cephalopods. They captured the bizarre scene while studying the depths…
How is Agentic AI changing healthcare security
How Does Agentic AI Revolutionize Healthcare Security? Are you prepared to explore the transformative power of Agentic AI in securing the healthcare industry? The intersection of artificial intelligence and cybersecurity has opened doors to innovative methodologies. This sector is under…
What future trends will define Agentic AI governance
How Are Non-Human Identities Shaping Cloud Security? What does it take to bridge the gap between security and R&D teams when managing non-human identities in cloud environments? Non-human identities (NHIs) are pivotal in modern cybersecurity frameworks, acting as machine identities…
Can Agentic AI ensure full IAM compliance
Why Are Non-Human Identities Crucial for Cloud Security? Does your organization fully understand the importance of Non-Human Identities (NHIs) in cybersecurity? With a crucial component of cloud security, managing these machine identities effectively can be the key to minimizing risks…
How secure are secrets vaults in cloud environments
Are You Overlooking Non-Human Identities in Cloud Security? Machine identities have emerged as critical components that require immediate attention and robust management. Where organizations increasingly rely on digital transformations and cloud environments, the security of Non-Human Identities (NHIs) and their…
NDSS 2025 – Silence False Alarms
Session 11A: Blockchain Security 2 Authors, Creators & Presenters: Qiyang Song (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Heqing Huang (Institute of Information Engineering, Chinese Academy of Sciences), Xiaoqi…
More AI security noise – chatbots going rogue
People rush to AI bots for their most sensitive tasks these days without security leading the way. The Moltbot frenzy reminds us we just wrote about this recently – the difference between AI security noise and high-impact threats. AI Security…
AI Compliance Tools: What to Look For – FireTail Blog
Jan 30, 2026 – Alan Fagan – Quick Facts: AI Compliance ToolsManual tracking often falls short: Spreadsheets cannot track the millions of API calls and prompts generated by modern AI systems.Real-time is required: The best AI compliance tools monitor live…