Most firms fall short on data resilience. Learn how to close the gaps & turn resilience into a growth advantage. The post Data Resilience Reality Check: Why Most Organizations are Failing Their Own Audits appeared first on Security Boulevard. This…
Tag: Security Boulevard
Accelerated Polling
Product Update: Version 5.1 This release is all about helping you move faster, see more, and manage your infrastructure with greater ease. From real-time polling and smarter layout tools to expanded support for DC power and new visual enhancements in…
Empower Your Team with Better Secrets Management
How Essential is Effective Secrets Management in Today’s Cybersecurity Landscape? The management of Non-Human Identities (NHIs) and their secrets has become an increasingly important consideration. It comes as no surprise that many organizations, including those in the financial services, healthcare,…
Innovations in Managing Non-Human Identities
Why is NHI Management Crucial in Today’s Expanding Digital Landscape? Have you ever considered how the rise in online and interconnected industries could be putting your company’s systems at risk? Where rapid technological advancements continue to transform industries and businesses,…
BSidesSF 2025: The Power Of Persuasion: Better Security Through… Manipulation?
Creator, Author and Presenter: Nate Lee Our deep appreciation to Security BSides – San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView…
How Financial Services Can Use Agentic Identity to Stop Fraud and Streamline Loan Approvals
In financial services, every transaction is built on trust. When an AI agent acts on behalf of a customer — checking credit scores, verifying KYC documents, or submitting a loan application — identity is the control plane. Without it, the…
RetailThe AI Shopping Concierge — How Retailers Can Safely Orchestrate Identity Across Agentic Workflows
Retail is moving fast into agentic AI. Imagine a shopping concierge agent that compares prices, applies loyalty discounts, and completes a purchase for you — all in seconds. This sounds like a dream for customers, but for retailers, it’s a…
Airline Disruption Recovery — How Agentic Identity Keeps Travel on Track
When flights get delayed, passengers want answers fast: rebooking, hotel vouchers, refund options. Human agents can’t scale to meet this surge, but AI agents can. The challenge? Identity. The post Airline Disruption Recovery — How Agentic Identity Keeps Travel on…
Sandboxed to Compromised: New Research Exposes Credential Exfiltration Paths in AWS Code Interpreters
In my first article on Bedrock AgentCore Code Interpreters, I demonstrated that custom code interpreters can be coerced into performing AWS control plane actions by non-agentic identities. This presented a novel path to privilege escalation, whereby any user with access…
The Developer’s Hippocratic Oath in the Age of AI
The best software developers I’ve had the privilege to work with live by the principle that they have ultimate responsibility for the code we introduce. They take ownership of what they write, review, and ship. They ask questions when they…
BSidesSF 2025: BSidesSF 2025 – Light In The Labyrinth: Breach Path Analysis For Anyone
Creator, Author and Presenter: Parker Shelton Our deep appreciation to Security BSides – San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView…
Why the Principle of Least Privilege Is Critical for Non-Human Identities
Overprivileged non-human identities expose enterprises to massive risk. Enforcing least privilege with automation and visibility is critical for security. The post Why the Principle of Least Privilege Is Critical for Non-Human Identities appeared first on Security Boulevard. This article has…
NYU Scientists Develop, ESET Detects First AI-Powered Ransomware
Scientists at NYU developed a ransomware prototype that uses LLMs to autonomously to plan, adapt, and execute ransomware attacks. ESET researchers, not knowing about the NYU project, apparently detected the ransomware, saying it appeared to be a proof-of-concept and a…
Reflecting on Wallarm’s Journey: Growth, Resilience, and What Comes Next
By Ivan Novikov and Stepan Ilyin When we started Wallarm, we focused on the APIs that power modern apps. We built an API-first platform, used AI from day one, and secured early patents in behavior-based detection and automated policy creation.…
Why Compliance-First Cybersecurity Programs Fail (And What Actually Works)
Most B2B companies build cybersecurity programs backwards – starting with compliance instead of real security. Learn why this approach fails and how fractional CISO services can help you build effective security that actually prevents breaches while achieving compliance. The post…
H2O-3 JDBC Deserialization Vulnerability (CVE-2025-6507)
Overview Recently, NSFOCUS CERT detected that H2O-3 released a security update to fix the H2O-3 JDBC deserialization vulnerability (CVE-2025-6507); This vulnerability is a bypass of CVE-2024-45758 and CVE-2024-10553. Due to the deserialization flaw in the system’s JDBC connection processing logic,…
Are Your NHIs Fully Protected from Cyber Threats?
Understanding the Significance of NHIs in Cybersecurity Why are Non-Human Identities (NHIs) so crucial in cybersecurity? These machine identities consist of Secrets (encrypted tokens, keys, or passwords) and permissions that are akin to a passport-visa system. NHIs and their Secrets…
Ensuring Compliance and feeling reassured in the Cloud
How Can Non-Human Identities (NHIs) Enhance Cloud Security? Is your organization leveraging the power of Non-Human Identities (NHIs) and Secrets Security Management to fortify cloud security? If not, you could be leaving yourself vulnerable to potential cyber threats. The management…
Why Misconceptions About Cloud Managed Services Can Cost You
Scaling Kubernetes isn’t just about launching containers—it’s about choosing support models that truly let developers innovate instead of drowning in operational noise. Recently, I read Kathie Clark’s excellent blog, “What I Got Wrong About Cloud Managed Services (And Why It…
Salesloft Drift Breach Rolls Up Cloudflare, Palo Alto, Zscaler, and Others
Cloudflare, Palo Alto Networks, and Zscaler are the latest among hundreds of victims of an expanding data-stealing attack by the UNC6395 threat group that is exploiting compromised OAuth tokens associated with Salesloft’s Drift app to access organizations’ Salesforce tenants and…