Choosing the right identity verification (IDV) partner is one of the most critical security decisions you’ll make. As organizations fortify their defenses, it’s clear that verifying the identity of your workforce requires a fundamentally different approach than verifying customers. The…
Tag: Security Boulevard
Securing the AI Era: Sonatype Safeguards Open Source Software Supply Chains
Open source drives modern software—but with innovation comes risk. Learn how Sonatype secures the software supply chain to enable safer, faster delivery. The post Securing the AI Era: Sonatype Safeguards Open Source Software Supply Chains appeared first on Security Boulevard.…
Securing Online Writing Platforms with Passwordless Authentication
Discover how passwordless authentication secures online academic writing platforms while enhancing user privacy and trust. The post Securing Online Writing Platforms with Passwordless Authentication appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…
Multiple Ransomware Groups are Using Tool to Kill EDR Defenses: Sophos
Multiple ransomware vendors are using the same EDR killer tool, which not only adds to the trend in developing such payloads to terminate protections for systems but also suggests that competing threat actors are sharing tools and technical knowledge, which…
CISA, Coast Guard Hunt Engagement Offer Path to Protect Critical Infrastructure
Organizations should remember that the proactive hunts conducted by CISA, which has been stripped down and is under assault by the Trump administration, are invaluable. The post CISA, Coast Guard Hunt Engagement Offer Path to Protect Critical Infrastructure appeared…
Everything You Need to Know About the California Consumer Privacy Act (CCPA) in 2025
California Consumer Privacy Act (CCPA): CCPA and CPRA, Simplified On July 1, 2025, the California Attorney General settled with Healthline for $1.55 million, the highest CCPA-related fine to date, citing… The post Everything You Need to Know About the California…
Has Cyber Been Infected With the Economic Malaise?
From the floor at #BlackHat2025: Cybersecurity has the blinking lights, but this year it also has blood in the water, writes Alan. The post Has Cyber Been Infected With the Economic Malaise? appeared first on Security Boulevard. This article has…
News alert: SpyCloud’s AI-powered platform mimics veteran analysts, speeds threat detection
Austin, TX, Aug. 6, 2025, CyberNewswire: SpyCloud, the leader in identity threat protection, today announced a significant enhancement to its SaaS Investigations solution: the integration of advanced AI-powered insights that mirror the tradecraft of SpyCloud’s seasoned investigators. Building on ……
Secrets Management Fireside Chat: Doppler, Financial Times, BODi, and Secureframe
Why a secrets management strategy is now critical for modern security. The post Secrets Management Fireside Chat: Doppler, Financial Times, BODi, and Secureframe appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article:…
Palo Alto Networks Previews ASPM Module for Cortex Cloud Platform
Palo Alto Networks this week revealed it is providing early access to an application security posture management (ASPM) module for its Cortex security platform as part of a larger effort to streamline cybersecurity workflows. The Cortex Cloud combines a cloud…
Contrast Security Adds GitHub Copilot and Sumo Logic Integrations to ADR Platform
This week at the Black Hat USA 2025 conference, Contrast Security added integrations with GitHub Copilot and the security information and event management (SIEM) platform from Sumo Logic to the Northstar edition of its application detection and response (ADR) platform. The…
The Promise and Pitfalls of Ephemeral Identities
Short-lived credentials reduce exposure – but they aren’t secure by default. Here’s what ephemeral identity gets right, and where it can fail. The post The Promise and Pitfalls of Ephemeral Identities appeared first on Security Boulevard. This article has been…
https://www.youtube-nocookie.com/embed/IPusFv_iEI8?si=Kr-IckosVNP0Azou
Creators/Authors/Presenters: Ashish Rajan, Jackie Bow, Kane Narraway Our deep appreciation to Security BSides – San Francisco and the Creators/Authors/Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC…
DataDome & TollBit Partner to Protect and Monetize AI traffic
DataDome and TollBit partner to help businesses protect content and monetize compliant AI traffic. Gain real-time protection, actionable insights, and new revenue from agentic AI. The post DataDome & TollBit Partner to Protect and Monetize AI traffic appeared first on…
Sysdig Previews Set of AI Agents for Cloud Security Platform
Sysdig, this week at the Black Hat USA 2025 conference, revealed it is providing early access to artificial intelligence (AI) agents that have been added to its cloud native application protection platform (CNAPP). The post Sysdig Previews Set of AI…
Where Physical Security Intersects With Cyber
The Black Hat Conference has always been a harbinger of where security is headed next. This year, predictably, the conversation is dominated by AI — AI-enhanced threats, AI-driven defenses, AI-this, AI-that. But amid all the artificial intelligence noise, I found…
AI Agents in Cybersecurity: A Practical Roadmap for Leaders
A leader’s guide on deploying AI agents – from selecting use cases and establishing governance, to safety controls and showing the value. The post AI Agents in Cybersecurity: A Practical Roadmap for Leaders appeared first on Security Boulevard. This article…
Securing Your OTP Fortress A Deep Dive into Delivery Channel Vulnerabilities
Explore the security of OTP delivery channels like SMS, Email, and Voice. Learn about vulnerabilities and best practices for secure authentication. The post Securing Your OTP Fortress A Deep Dive into Delivery Channel Vulnerabilities appeared first on Security Boulevard. This…
Sound Security A Deep Dive into Voice OTP Technology
Explore Voice OTP technology, its implementation, security, and role in passwordless authentication. Learn best practices for developers in OTP as a service and CIAM. The post Sound Security A Deep Dive into Voice OTP Technology appeared first on Security Boulevard.…
FIDO2 WebAuthn Powering Passwordless Authentication’s Next Wave
Learn how to implement FIDO2/WebAuthn for passwordless authentication. This guide covers passkeys, security, and best practices for developers and IT professionals. The post FIDO2 WebAuthn Powering Passwordless Authentication’s Next Wave appeared first on Security Boulevard. This article has been indexed…