Tag: Security Boulevard

AI Security: What Enterprises Are Getting Wrong

The CSA Alliance has released their annual report on AI and security. Alan, Anton Chuvakin and Hillary Baron discuss the state of AI security and governance, how companies are actually adopting AI (both agentic and generative) and most importantly how…

The Next Security Battleground: Agentic Identity

Shahar Tal, CEO and co-founder of Cyata, discusses how the company is building the control plane for agentic identity. With deep roots in Israel’s Unit 8200 and Check Point, Cyata is tackling one of the next big security challenges: governing,…

Classroom Device Management: 8 Strategies for K-12 Success

Digital devices now shape daily instruction in K–12 classrooms. Laptops, tablets, and phones support research, collaboration in the classroom, and blended learning. Many schools also cater for bring your own device (BYOD) environments. These tools can unlock engagement and creativity,…

Delinea Acquries StrongDM to Secure Access to IT Infrastructure

Delinea announces the acquisition of StrongDM to enhance its privileged access management platform, offering just-in-time access for IT infrastructure and improving cybersecurity for human and non-human identities. The post Delinea Acquries StrongDM to Secure Access to IT Infrastructure appeared first…

What innovations do NHIs bring to cloud security

How Are Non-Human Identities Revolutionizing Cloud Security? What drives the evolution of cybersecurity? The answer often lies in the innovative management of non-human identities (NHIs). With the unprecedented surge in cloud adoption, the challenge of securing machine identities and their…

Can Agentic AI keep your data protection strategies ahead

How Can Advanced AI Strategies Transform Data Protection? How do organizations ensure that their data protection strategies remain cutting-edge and resilient against evolving threats? For many cybersecurity professionals, the key lies in harnessing the potential of Agentic AI. Advanced AI…

How do you trust a machine with secret management

How Do Organizations Ensure Machine Trust in Secret Management? How can organizations ensure that machines, which are increasingly handling vast amounts of sensitive data, can be trusted with secret management? With digital landscpe evolves, machine identities are taking center stage.…

Are NHIs scalable for growing tech ecosystems

How Does Non-Human Identity Management Enhance Scalability in Tech Ecosystems? Is your organization struggling to keep pace with the scalability demands of emerging tech? With technology grow and evolve, the role of Non-Human Identities (NHIs) in ensuring seamless operations becomes…

DORA penetration testing and threat-led exercises explained

The Digital Operational Resilience Act (DORA) introduces a unified framework for managing ICT risk across the European financial sector, with key requirements, including penetration testing, coming into force in 2026. Its aim is to ensure that regulated organisations, and the…