Category: Security Boulevard

A Walk in the Park

In August of 2024 I stopped in my local book shop (shoutout to The Raven Bookstore) as I often do to browse the shelves and see if there was anything I couldn’t live without. A very colorful book jacket caught…

Reassuring Secrets Rotation for Compliance

How Do Non-Human Identities Impact Cloud Security? How do organizations ensure that their cloud are secure from potential threats? Non-Human Identities (NHIs) are critical components in cybersecurity, especially in cloud-based environments. These machine identities, essentially a combination of encrypted secrets…

Stay Relaxed with Enhanced Data Security

How Can Organizations Achieve Enhanced Data Security with Non-Human Identities? Have you ever wondered how modern organizations can achieve enhanced data security while maintaining efficient workflows? The management of Non-Human Identities (NHIs) plays a vital role in ensuring robust protection…

Powerful Tools to Manage Machine Identities

Why Are Non-Human Identities Critical in Cybersecurity? What happens when machine identities are not managed efficiently? Cybersecurity is rapidly transforming with increasing reliance on machine identities, also referred to as Non-Human Identities (NHIs). These identities are often overlooked but hold…

Defending DNS with Infoblox and Protective DNS

For too long, we’ve treated DNS as a simple utility. It’s just a phonebook for the internet, right? Treating it that way is a mistake. Nearly every single malicious action, whether it’s a phishing link, a command-and-control (C2) callback, or…

Randall Munroe’s XKCD ‘Hot Water Balloon”

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Hot Water Balloon” appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall…

Cyber Risk in Real Time: Lessons from the Front Lines

Alan and Kip Boyle, founder and chief information security officer at Cyber Risk Opportunities, discuss how organizations can rethink cybersecurity in terms of measurable risk rather than endless checklists and compliance frameworks. Boyle, a longtime cybersecurity leader and author, argues…

The Top 8 Cyber Risk Assessment Tools and Solutions

Cyber risk assessment is the heart of modern cyber risk management. In 2025, as enterprises face AI-driven attacks, record ransomware volumes, and regulators demanding operational resilience, the ability to assess cyber risks in business and financial terms has become mission-critical.…

Elevating the Human Factor in a Zero-Trust World

Zero-trust isn’t just technology — it’s a human-centered strategy. Real security depends on context, judgment and collaboration, not automation alone. The post Elevating the Human Factor in a Zero-Trust World appeared first on Security Boulevard. This article has been indexed…

Improving NHI Lifecycle Management Continuously

What is the True Cost of Overlooking Non-Human Identities? When organizations increasingly move operations to the cloud, the spotlight is now on securing machine identities, also known as Non-Human Identities (NHIs). But what happens when these identities are overlooked? The…

Independent Control Over Cloud Identities

How Secure Are Your Cloud-Based Non-Human Identities? What measures are you taking to ensure the security of your cloud-based systems? Managing Non-Human Identities (NHIs) has become a critical focus for diverse sectors, including financial services, healthcare, and travel. NHIs, essentially…