Alan warns that cybersecurity is stuck in a “Maginot Line” mindset — clinging to outdated tools while attackers weaponize AI, supply chain compromises, and polymorphic malware. He argues for AI-native defenses, real agentic automation, and stronger supply chain vetting to…
Category: Security Boulevard
Feel Secure: Advanced Techniques in Secrets Vaulting
What Makes Non-Human Identities Crucial in Cloud Security? How do organizations manage the unique challenges posed by non-human identities? Non-human identities (NHIs) are critical components of robust security strategies. Conceived as virtual entities consisting of encrypted passwords, tokens, or keys—collectively…
Adapting Your Security Strategy for Hybrid Cloud Environments
How Can Organizations Adapt Their Security Strategies for Hybrid Cloud Environments? Organizations face unique challenges while managing their hybrid clouds. But how can they efficiently adapt their security strategies to maintain robust protection? Hybrid cloud security has become a crucial…
Continuous Improvement in Secrets Management
Why Are Non-Human Identities Crucial for Cybersecurity? How do organizations ensure the security of machine identities? Non-Human Identities (NHIs) provide a compelling answer, offering a structured approach to managing machine identities and secrets securely. NHIs are critical components in cybersecurity,…
USENIX 2025: PEPR ’25 – Enterprise-Scale Privacy For AI: How Canva Scaled Customer Control Of Data For AI Training
Creator, Author and Presenter: Phillip Ward, Canva Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ’25 – Enterprise-Scale Privacy For AI: How Canva…
Proactive Compliance: A New Era in Cloud Security
Why Are Non-Human Identities the Key to Proactive Compliance in Cloud Security? Where data breaches and cyber threats have become a pressing concern, how are organizations safeguarding their digital assets? The answer lies in the strategic management of Non-Human Identities…
Building Scalable Security with Cloud-native NHIs
How Can Scalable Security Transform Your Business? Where businesses rapidly migrate to the cloud, scalability in security is more crucial than ever. Enterprises must adapt their cybersecurity strategies to protect sensitive data and manage machine identities efficiently. Enter the concept…
Securing Your Assets: Strategies That Work Every Time
Why Are Non-Human Identities the Unsung Heroes of Asset Security? Where digital transformation drives business innovation, the necessity for robust asset security strategies is paramount. But here’s a question often overlooked: How do organizations manage and protect the vast array…
USENIX 2025: PEPR ’25 – UsersFirst: A User-Centric Threat Modeling Framework For Privacy Notice And Choice
Creators, Authors and Presenters: Norman Sadeh And Lorrie Cranor, Carnegie Mellon University Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: PEPR ’25 – UsersFirst:…
Complete Guide to Understanding Risk-Based Authentication
Learn everything about Risk-Based Authentication (RBA): its benefits, implementation, and future trends. Enhance your application security with this comprehensive guide. The post Complete Guide to Understanding Risk-Based Authentication appeared first on Security Boulevard. This article has been indexed from Security…
Are Your Secrets Management Practices Up to Par?
Why Are Non-Human Identities Crucial in Cybersecurity? How often do we consider machine identities when contemplating cybersecurity measures? It’s clear that non-human identities (NHIs) are essential players in maintaining robust security frameworks. These identities, often overlooked, are vital in fortifying…
Staying Ahead of Cyber Threats with Proactive NHIs
Are You Prepared for the Next Cybersecurity Threat? Where cyber threats evolve faster than yesterday’s news, staying ahead requires a multi-faceted approach. One significant area of focus is the management of Non-Human Identities (NHIs), crucial components. But what precisely makes…
USENIX 2025: Using Privacy Infrastructure To Kickstart AI Governance: NIST AI Risk Management Case Studies
Creators, Authors and Presenters: Katharina Koerner, Trace3; Nandita Rao Narla, DoorDash Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink The post USENIX 2025: Using Privacy Infrastructure To Kickstart…
China is Fueling Surveillance Technology Adoption in Latin America—Who is in Charge of Data Privacy?
China’s Belt and Road Initiative (BRI) is well known for funding major infrastructure projects, including new highways, ports and energy plants across more than 150 countries. However, China has also gained a serious foothold when it comes to surveillance infrastructure.…
Bridging the Gap Between Security Teams and Tools
Craig Adams, chief product officer at Rapid7, discusses the growing complexity of security operations and how organizations can better align tools, teams and processes. Adams, a longtime technology leader, notes that one of the biggest pain points he hears from…
Why Identity and Access Still Represent the Weakest Link
Idan Dardikman, co-founder and CTO of Koi Security, discusses the company’s emergence from stealth and its mission to address one of cybersecurity’s most persistent challenges: securing identity. Dardikman explains that while the industry has poured resources into endpoint, network, and…
Cybersecurity Snapshot: CISA Highlights Vulnerability Management Importance in Breach Analysis, as Orgs Are Urged To Patch Cisco Zero-Days
CISA’s takeaways of an agency hack include a call for timely vulnerability patching. Plus, Cisco zero-day bugs are under attack — patch now. Meanwhile, the CSA issued a framework for SaaS security. And get the latest on the npm breach,…
This Time, I Had Something Special to Offer
The call came from a Fortune 20 customer yesterday morning. “Hey, Vinay, we’re getting flooded with noise about these two new Cisco ASA/FTD vulnerabilities that CISA posted the emergency advisory on. We are seeing a ton of inconsistent information, would…
Why SecOps Needs Simplicity in an Era of Expanding Attack Surfaces
Craig Adams, chief product officer at Rapid7, discusses the growing complexity of security operations and how organizations can better align tools, teams and processes. Adams, a longtime technology leader, notes that one of the biggest pain points he hears from…
Salesforce Faces Lawsuits Over Compromises of Third-Party Apps: Report
Salesforce is facing a possible class action lawsuit from almost two dozen plaintiffs who say the SaaS giant should have had better security around its platform, even though a spate of high-profile data-stealing attacks on third-party partners did not start…