Session 10B: Ransomware Authors, Creators & Presenters: Kevin van Liebergen (IMDEA Software Institute), Gibran Gomez (IMDEA Software Institute), Srdjan Matic (IMDEA Software Institute), Juan Caballero (IMDEA Software Institute) PAPER all your (data)base are belong to us: Characterizing Database Ransom(ware) Attacks…
Category: Security Boulevard
Randall Munroe’s XKCD ‘High Altitude Cooking Instructions’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘High Altitude Cooking Instructions’ appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…
Google’s Universal Commerce Protocol: Why the Future of Agentic Commerce Depends on Security
Google launched Universal Commerce Protocol to connect AI agents with retailers at scale, but stopping fraud requires agent trust management and intent detection. The post Google’s Universal Commerce Protocol: Why the Future of Agentic Commerce Depends on Security appeared first…
Secure, Reliable Terraform At Scale With Sonatype Nexus Repository
Terraform has become the de facto standard for infrastructure as code (IaC). From cloud-native startups to global enterprises, teams rely on Terraform to define, provision, and manage infrastructure with speed and consistency across cloud and on-prem environments. The post Secure,…
NDSS 2025 – ERW-Radar
Authors, Creators & Presenters: Lingbo Zhao (Institute of Information Engineering, Chinese Academy of Sciences), Yuhui Zhang (Institute of Information Engineering, Chinese Academy of Sciences), Zhilu Wang (Institute of Information Engineering, Chinese Academy of Sciences), Fengkai Yuan (Institute of Information Engineering,…
F5 Strengthens, Scales & Sustains AI Security With Integrated Runtime Protection
F5 AI Guardrails and F5 AI Red Team extend platform capabilities with continuous testing, adaptive governance and real-time protection. The post F5 Strengthens, Scales & Sustains AI Security With Integrated Runtime Protection appeared first on Security Boulevard. This article has…
AirDrop Security in iOS 26.2: Time Limits, Codes & Privacy Best Practices
In this episode, we explore the latest changes to AirDrop in iOS 26.2 and how they enhance privacy and security. Learn about the new 10-minute limitation on the ‘Everyone’ setting and the introduction of AirDrop codes for safer file sharing…
The New ATO Playbook: Session Hijacking, MFA Bypass, and Credential Abuse Trends for 2026
Account takeover didn’t disappear — it evolved Account takeover (ATO) and credential abuse aren’t new.What’s changed is how attackers do it and why many traditional defenses no longer catch it early. Today’s ATO attacks don’t always start with: Instead, they…
A One-Page Introduction to CardSpace Technology
Explore the fundamentals of CardSpace technology, its role in the identity metasystem, and lessons for modern enterprise SSO and CIAM solutions. The post A One-Page Introduction to CardSpace Technology appeared first on Security Boulevard. This article has been indexed from…
What is User Managed Access?
Deep dive into User Managed Access (UMA). Learn how UMA 2.0 works with OAuth2 and OIDC to provide user-centric privacy and resource sharing in Enterprise SSO. The post What is User Managed Access? appeared first on Security Boulevard. This article…
NDSS 2025 – RContainer
Session 10A: Confidential Computing 2 Authors, Creators & Presenters: Qihang Zhou (Institute of Information Engineering, Chinese Academy of Sciences), Wenzhuo Cao (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyberspace Security, University of Chinese Academy of Sciences), Xiaoqi…
Cybersecurity’s New Business Case: Fraud
Government security leaders are struggling. Cyber investments are lagging. Resources are being cut. The problem is getting worse. Let’s explore solutions. The post Cybersecurity’s New Business Case: Fraud appeared first on Security Boulevard. This article has been indexed from Security…
How does AI ensure calm in cybersecurity operations?
The Strategic Role of Non-Human Identities in AI-Powered Cybersecurity Operations What is the role of Non-Human Identities (NHIs) in achieving seamless security for your organization? With digital continues to expand, cybersecurity professionals face the challenges of managing complex systems and…
How do NHIs deliver value in digital security landscapes?
Is Your Organization Missing Out on the Value of Non-Human Identities in Digital Security? The rapid expansion of cloud environments has ushered in a powerful yet complex challenge: managing digital identities that aren’t tied to any one person. These Non-Human…
Can you trust AI with your digital secrets management?
How Does Non-Human Identities (NHI) Impact Digital Secrets Management? Is your organization adequately prepared to manage non-human identities (NHIs) and protect your digital secrets? That’s a critical question. With cyber threats become more sophisticated, the role of NHIs in digital…
How is AI security evolving for better protection?
How Can Non-Human Identities Enhance AI Security? What are the key challenges faced by organizations in managing cybersecurity for machine identities? With digital systems continue to evolve, cybersecurity professionals are increasingly focusing on the protection and management of Non-Human Identities…
NDSS 2025 – Secure Data Analytics
Session 10A: Confidential Computing 2 Authors, Creators & Presenters: Byeongwook Kim (Seoul National University), Jaewon Hur (Seoul National University), Adil Ahmad (Arizona State University), Byoungyoung Lee (Seoul National University) PAPER Secure Data Analytics in Apache Spark with Fine-grained Policy Enforcement…
DAST vs Penetration Testing: Key Differences in 2026
Learn about the key differences between DAST and pentesting, the emerging role of AI pentesting, their roles in security testing, and which is right for your business. The post DAST vs Penetration Testing: Key Differences in 2026 appeared first on…
[Webinar] Doing More With Less: How Security Teams Escape Manual Work with Efficient Workflows
Security teams are under constant pressure to do more with the same resources. Manual processes, fragmented tools, and inefficient workflows can slow teams down and pull focus away from what matters most. In this live webinar, experienced security practitioners share…
ISO 27001:2013 vs 2022 – A Quick Comparison Guide
ISO 27001 is an internationally recognized standard that defines the requirements for establishing, implementing, maintaining, and continuously improving an Information Security Management System (ISMS) within an organization. First introduced in 1999, the standard has evolved through multiple revisions to address…