Tag: Security Boulevard

Bridging the Gap Between Security Teams and Tools

Craig Adams, chief product officer at Rapid7, discusses the growing complexity of security operations and how organizations can better align tools, teams and processes. Adams, a longtime technology leader, notes that one of the biggest pain points he hears from…

Why Identity and Access Still Represent the Weakest Link

Idan Dardikman, co-founder and CTO of Koi Security, discusses the company’s emergence from stealth and its mission to address one of cybersecurity’s most persistent challenges: securing identity. Dardikman explains that while the industry has poured resources into endpoint, network, and…

This Time, I Had Something Special to Offer

The call came from a Fortune 20 customer yesterday morning. “Hey, Vinay, we’re getting flooded with noise about these two new Cisco ASA/FTD vulnerabilities that CISA posted the emergency advisory on. We are seeing a ton of inconsistent information, would…

The New Perimeter is Your Supply Chain

Alan examines why the software supply chain has become the new perimeter in cloud-native security. From SBOMs to SLSA and Sigstore, discover how leaders can defend against attacks that target dependencies, pipelines and trusted updates. The post The New Perimeter…

How to Enable MFA Before RDP and SSH Sessions

Remote access is essential for modern enterprises. IT administrators, DevOps teams, and vendors need to connect to critical infrastructure using Remote Desktop Protocol (RDP) or Secure Shell (SSH). But many organizations still allow these sessions without enforcing a critical security…

How to Manage Shadow AI Risk Without Killing Innovation

Shadow AI isn’t a fringe behavior; it’s the norm. My team recently analyzed AI usage patterns across multiple industries and found signs of unapproved AI activity in more than 80% of the 100+ customer organizations sampled. Whether it’s sales teams…

Malicious MCP Server Found Quietly Stealing Emails

A popular MCP server in the NPM repository that was being downloaded 1,500 times a week suddenly began quietly copying emails and sending them to a C2 server after the developer inserted a line of code. Koi Security researchers said…

Introducing Scoped Organization Tokens for SonarQube Cloud

Secure your CI/CD pipelines with SonarQube Cloud’s Scoped Organization Tokens (SOT). A resilient, user-decoupled way to manage authentication and prevent broken builds. The post Introducing Scoped Organization Tokens for SonarQube Cloud appeared first on Security Boulevard. This article has been…

Post-Quantum Cryptography and the Future of Data Security

The post <b>Post-Quantum Cryptography and the Future of Data Security</b> appeared first on Sovy. The post Post-Quantum Cryptography and the Future of Data Security appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…

SpamGPT Amps Up Enterprise Email Security Threats

Researchers warn that SpamGPT, an AI-powered spam and phishing toolkit, lowers the barrier for cybercriminals with scalable, evasive email attacks. The post SpamGPT Amps Up Enterprise Email Security Threats  appeared first on Security Boulevard. This article has been indexed from…

Credit Unions Replaced Fragmented Tools With Seceon’s Platform

Credit unions are the financial lifeline for more than 139 million Americans. Built on a member-first philosophy, these not-for-profit institutions provide affordable banking, community trust, and financial empowerment. But in today’s digital-first era, credit unions face growing cybersecurity challenges. With…

Unmasking the Insider Seller: Dark Web Attribution

Nisos Unmasking the Insider Seller: Dark Web Attribution Most insider threat teams know what to watch for inside the network: unusual access requests, suspicious file movement, or behavior changes that trip internal tools… The post Unmasking the Insider Seller: Dark…