Category: Security Boulevard

Navigating Fraud in Customer Verification and Real-Time Payments

As technology continues to rapidly advance (i.e. generative AI, large language models, quantum computing, etc.), financial institutions (FIs) must evolve while balancing opportunity and risk. FIs are embracing advanced technology to meet rising customer expectations for frictionless digital experiences and…

Metrics Every CISO Needs for Threat-Led Defense Success

Security leaders are under increasing pressure to prove that their defenses actually work. Board members and stakeholders want to see measurable progress, yet most metrics available to CISOs today don’t quite fit that need.  The post Metrics Every CISO Needs…

Book Review: The Business of Secrets

The Business of Secrets: Adventures in Selling Encryption Around the World by Fred Kinch (May 24, 2004) From the vantage point of today, it’s surreal reading about the commercial cryptography business in the 1970s. Nobody knew anything. The manufacturers didn’t…

How Rapid AI Adoption Is Creating an Exposure Gap

As organizations rush to deploy AI, enterprise defenses are struggling to keep up. This blog explores the emerging AI exposure gap — the widening divide between innovation and protection — and what security leaders can do to close it. Key…

Beyond Passwords: How Behaviour and Devices Shape Stronger Logins

Discover how behaviour, devices, and adaptive authentication systems create smarter, stronger, and more secure logins for modern enterprises. The post Beyond Passwords: How Behaviour and Devices Shape Stronger Logins appeared first on Security Boulevard. This article has been indexed from…

Ensuring Scalability in Your NHI Security Practices

Why Should Non-Human Identities (NHIs) Be Your Next Security Focus? Have you considered how Non-Human Identities (NHIs) fit into your organization’s cybersecurity strategy? Where cloud computing is omnipresent, securing NHIs is not just an option but a necessity for any…

Confidently Managing Your NHIs’ Security Posture

Why is Managing Non-Human Identities Crucial for Your Organization’s Security Posture? Digital is continually evolving, and with it comes the increasing reliance on non-human identities (NHIs) to automate and streamline processes across various industries. But have you ever stopped to…

How Smart NHI Solutions Enhance Security Measures

How Does NHI Management Revolutionize Security Frameworks? Have you ever wondered why securing machine identities is as critical as protecting human identities? Non-Human Identities (NHIs), such as machine or application identities, play an increasingly vital role in cybersecurity. When businesses…

Creating Stability in NHI Management Across Multiple Clouds

How Can Organizations Achieve Stability in Managing Non-Human Identities Across Multiple Clouds? Where technology rapidly evolves and security threats become increasingly sophisticated, how can organizations ensure stability when managing Non-Human Identities (NHIs) across multiple cloud environments? Understanding the key strategies…

Nile’s Bold Claim: Your LAN Architecture Is Fundamentally Broken

At Security Field Day, Nile delivered a message that challenges decades of enterprise networking orthodoxy: the traditional Local Area Network architecture is fundamentally obsolete for modern security requirements. The problem isn’t subtle. While connectivity remains the lifeblood of most organizations,…

Using AI to Predict and Disrupt Evolving Cyberattacks

Rachel Jin, chief enterprise platform officer at Trend Micro, explains how multiple forms of artificial intelligence (AI) will be used to predict and disrupt cyberattacks even as they grow in volume and sophistication. As cyberattacks grow in scale, speed, and…