Tag: EN

ASU’s CISO: AI craze is a strategic opportunity for security

<p>Cybersecurity leaders should capitalize on AI mania in the enterprise to address longstanding security problems, urged Arizona State University CISO Lester Godsey.</p> <p>”Executive management is all [in on] AI,” Godsey said during a recent session at CactusCon, an annual cybersecurity…

New infosec products of the week: February 13, 2026

Here’s a look at the most interesting products from the past week, featuring releases from Armis, Black Duck, Portnox, and SpecterOps. Armis Centrix brings unified, AI-driven application security to the SDLC Armis has announced Armis Centrix for Application Security, which…

Closing the Cross-Platform Security Gap in Citizen Developer Apps

In many ways, managing security for citizen-developer apps is like flying several planes built by different manufacturers all at once. That’s because each no-code development platform uses separate dashboards, controls, policy engines, etc. Microsoft Power Platform measures altitude in feet,…

Understanding WS-Trust: A Guide to Secure Token Exchange

Deep dive into WS-Trust for enterprise identity. Learn about STS, token exchange, and secure SSO integration for modern B2B platforms. The post Understanding WS-Trust: A Guide to Secure Token Exchange appeared first on Security Boulevard. This article has been indexed…

Understanding Authentication Methods

Deep dive into authentication methods for B2B. Learn about SAML, OIDC, FIDO2, and passwordless flows to secure your enterprise apps and prevent data breaches. The post Understanding Authentication Methods appeared first on Security Boulevard. This article has been indexed from…

Demystifying SAML: The Basics of Secure Single Sign-On

Learn the basics of SAML authentication for Enterprise SSO. Understand IdP vs SP roles, XML assertions, and how to secure your B2B infrastructure effectively. The post Demystifying SAML: The Basics of Secure Single Sign-On appeared first on Security Boulevard. This…

Examples of SAML Providers

Explore top examples of SAML providers like Okta, Azure AD, and Ping Identity. Learn how to implement SAML SSO for secure enterprise identity management. The post Examples of SAML Providers appeared first on Security Boulevard. This article has been indexed…

RFC 4058 – Authentication Protocol Overview

A deep dive into RFC 4058 authentication protocols for software development. Learn about key management, security requirements, and modern ciam implementation. The post RFC 4058 – Authentication Protocol Overview appeared first on Security Boulevard. This article has been indexed from…

Anomaly Detection in Post-Quantum Encrypted MCP Metadata Streams

Secure your MCP metadata streams with post-quantum encryption and AI-driven anomaly detection. Learn to stop puppet attacks and tool poisoning in AI infrastructure. The post Anomaly Detection in Post-Quantum Encrypted MCP Metadata Streams appeared first on Security Boulevard. This article…