Category: Security Boulevard

NDSS 2025 – ERW-Radar

Authors, Creators & Presenters: Lingbo Zhao (Institute of Information Engineering, Chinese Academy of Sciences), Yuhui Zhang (Institute of Information Engineering, Chinese Academy of Sciences), Zhilu Wang (Institute of Information Engineering, Chinese Academy of Sciences), Fengkai Yuan (Institute of Information Engineering,…

A One-Page Introduction to CardSpace Technology

Explore the fundamentals of CardSpace technology, its role in the identity metasystem, and lessons for modern enterprise SSO and CIAM solutions. The post A One-Page Introduction to CardSpace Technology appeared first on Security Boulevard. This article has been indexed from…

What is User Managed Access?

Deep dive into User Managed Access (UMA). Learn how UMA 2.0 works with OAuth2 and OIDC to provide user-centric privacy and resource sharing in Enterprise SSO. The post What is User Managed Access? appeared first on Security Boulevard. This article…

NDSS 2025 – RContainer

Session 10A: Confidential Computing 2 Authors, Creators & Presenters: Qihang Zhou (Institute of Information Engineering, Chinese Academy of Sciences), Wenzhuo Cao (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyberspace Security, University of Chinese Academy of Sciences), Xiaoqi…

Cybersecurity’s New Business Case: Fraud

Government security leaders are struggling. Cyber investments are lagging. Resources are being cut. The problem is getting worse. Let’s explore solutions. The post Cybersecurity’s New Business Case: Fraud appeared first on Security Boulevard. This article has been indexed from Security…

How does AI ensure calm in cybersecurity operations?

The Strategic Role of Non-Human Identities in AI-Powered Cybersecurity Operations What is the role of Non-Human Identities (NHIs) in achieving seamless security for your organization? With digital continues to expand, cybersecurity professionals face the challenges of managing complex systems and…

How do NHIs deliver value in digital security landscapes?

Is Your Organization Missing Out on the Value of Non-Human Identities in Digital Security? The rapid expansion of cloud environments has ushered in a powerful yet complex challenge: managing digital identities that aren’t tied to any one person. These Non-Human…

Can you trust AI with your digital secrets management?

How Does Non-Human Identities (NHI) Impact Digital Secrets Management? Is your organization adequately prepared to manage non-human identities (NHIs) and protect your digital secrets? That’s a critical question. With cyber threats become more sophisticated, the role of NHIs in digital…

How is AI security evolving for better protection?

How Can Non-Human Identities Enhance AI Security? What are the key challenges faced by organizations in managing cybersecurity for machine identities? With digital systems continue to evolve, cybersecurity professionals are increasingly focusing on the protection and management of Non-Human Identities…

NDSS 2025 – Secure Data Analytics

Session 10A: Confidential Computing 2 Authors, Creators & Presenters: Byeongwook Kim (Seoul National University), Jaewon Hur (Seoul National University), Adil Ahmad (Arizona State University), Byoungyoung Lee (Seoul National University) PAPER Secure Data Analytics in Apache Spark with Fine-grained Policy Enforcement…

DAST vs Penetration Testing: Key Differences in 2026

Learn about the key differences between DAST and pentesting, the emerging role of AI pentesting, their roles in security testing, and which is right for your business. The post DAST vs Penetration Testing: Key Differences in 2026 appeared first on…

ISO 27001:2013 vs 2022 – A Quick Comparison Guide

ISO 27001 is an internationally recognized standard that defines the requirements for establishing, implementing, maintaining, and continuously improving an Information Security Management System (ISMS) within an organization. First introduced in 1999, the standard has evolved through multiple revisions to address…