Jump to content

Security

  • Static Application Security Testing (SAST)

  • Dynamic Application Security Testing (DAST)

  • Infrastructure Security Scanning

  • Secrets Management (e.g., HashiCorp Vault, AWS Secrets Manager)

  • Compliance & Governance in DevOps

  1. Author/Presenter: Charissa Kim Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Proving Ground – GEN-Z Critique On SOC 2 appeared first on Security Boulevard. View the full article

  2. The cybersecurity landscape is rapidly evolving, with vulnerability exploitation becoming a primary attack vector. Recent reports, including Google's 2024 Zero-Day Report, highlight a disturbing trend: attackers are increasingly focusing on enterprise technologies, particularly security appliances like firewalls and VPNs, as prime targets. Traditional security measures are falling short, leaving organizations vulnerable to data breaches and significant financial losses. Key Trends Increased Targeting of Enterprise Infrastructure: A significant portion of zero-day exploits, nearly half according to Google's 2024 report, now target enterprise technologies, including firew…

  3. Scott Shober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss a cyberattack on the Office of the Comptroller of the Currency. The podcast can be listened to in its entirety below. The post OCC Cyber Breach: Undetected for 8 Months, Exposing Sensitive Data appeared first on Security Boulevard. View the full article

  4. Your security team is spending 70% of their time chasing ghosts. Here's how to reclaim those hours for strategic work that actually matters. The post Why Your Security Team is Wasting 70% of Their Time on Phantom Threats And How to Fix It appeared first on Security Boulevard. View the full article

  5. We have discovered 10,000 vulnerabilities this year. Great, now what? This sounds like a lot of work has been done, but in reality, it is just noise, not a signal.... The post Why Fixing Every Vulnerability Is Wasting Time and Your Team’s Budget appeared first on Strobes Security. The post Why Fixing Every Vulnerability Is Wasting Time and Your Team’s Budget appeared first on Security Boulevard. View the full article

  6. The post What is DLP & Why It’s Not Enough to Stop Data Breaches Alone appeared first on Votiro. The post What is DLP & Why It’s Not Enough to Stop Data Breaches Alone appeared first on Security Boulevard. View the full article

  7. Despite the risks associated with artificial intelligence (AI) coding, developers remain enthusiastic, using it to keep up with the demand for delivery software at speed. A recent GitHub survey found that 92% of U.S.-based developers are using AI coding regularly. But while many developers are using AI to assist them in writing code, they seem to be doing so warily. A 2024 developer survey found that less than half of developers (43%) felt good about the accuracy of AI tools, while 31% were skeptical about them. The post MIT researchers look to tame AI code with new controls appeared first on Security Boulevard. View the full article

  8. As organizations brace for the rising tide of machine identities and prepare for a post-quantum cryptographic era, a quiet but crucial shift is underway in the financial sector: the deployment of a new, private PKI standard designed specifically to meet … (more…) The post Benchmarks Q&A: What the finance sector’s new X9 PKI standard signals for other industries first appeared on The Last Watchdog. The post Benchmarks Q&A: What the finance sector’s new X9 PKI standard signals for other industries appeared first on Security Boulevard. View the full article

  9. At RSAC 2025, the cybersecurity landscape underwent a seismic shift. This analysis reveals how autonomous AI agents, deepfake technologies, and quantum threats are forcing enterprises to fundamentally rethink security frameworks—and why yesterday's models won't protect tomorrow's assets. The post RSAC 2025: The Unprecedented Evolution of Cybersecurity appeared first on Security Boulevard. View the full article

  10. Why Opt for Budget-Friendly NHIs? Ever wondered how budget-friendly Non-Human Identities (NHIs) can redefine your organization’s cybersecurity? Through the strategic management of NHIs and their secrets, businesses can establish robust security controls, decrease the risk of breaches, and promote company-wide compliance – all while staying within budget. Cybersecurity Redefined: Harnessing the Power of NHIs NHIs […] The post NHI Solutions That Fit Your Budget appeared first on Entro. The post NHI Solutions That Fit Your Budget appeared first on Security Boulevard. View the full article

  11. In short order, U.S. prosecutors won an extradition case to bring a suspect in multiple ransomware cases to the United States and had another in England move in their favor when the British judge paved the way for an alleged hacker hired by a lobbyist firm to target climate change activists involved in lawsuits against a big oil company. The post U.S. Wins One, Maybe Two, Extradition Petitions in Unrelated Cases appeared first on Security Boulevard. View the full article

  12. 5 min readInstead of running static workflows, agents are building the system for you, deciding how to connect tools and take action on the fly. The post Self-Assembling AI and the Security Gaps It Leaves Behind appeared first on Aembit. The post Self-Assembling AI and the Security Gaps It Leaves Behind appeared first on Security Boulevard. View the full article

  13. Author/Presenter: HexxedBitHeadz Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Proving Ground – A New Host Touches The Beacon appeared first on Security Boulevard. View the full article

  14. It’s no secret that web applications have undergone a significant transformation over the past few years. The widespread adoption of containerization, serverless computing, low-code development, APIs, and microservices has redefined how applications are built, deployed, and scaled. According to Statista, over 60% of organizations now use Kubernetes to manage their containerized workloads. Meanwhile, security remains […] The post Redefining Application Security: Imperva’s Vision for the Future appeared first on Blog. The post Redefining Application Security: Imperva’s Vision for the Future appeared first on Security Boulevard. View the full article

  15. Every year at RSAC, the cybersecurity conversation swells with new terms, emerging threats, and fresh takes on familiar problems. What exactly is ‘agentic AI?’ At RSAC 2025, the volume knob turned to AI — its potential, its peril, and its … (more…) The post INTRODUCING: LastWatchdog strategic LinkedIN reels – insights from the ground floor at RSAC 2025 first appeared on The Last Watchdog. The post INTRODUCING: LastWatchdog strategic LinkedIN reels – insights from the ground floor at RSAC 2025 appeared first on Security Boulevard. View the full article

  16. Zero Trust Architecture (ZTA) is more than a buzzword; it is an essential security framework used to combat escalating cybersecurity threats. Cybersecurity has become a non-negotiable priority in every organization’s infrastructure. Today, network security is not just about defending against … Read More The post Importance of a Zero Trust Architecture appeared first on 12Port. The post Importance of a Zero Trust Architecture appeared first on Security Boulevard. View the full article

  17. Data anonymization can mean many things, depending on the specific technique applied. These five approaches represent the most common pathways to anonymizing (aka obfuscating, aka de-identifying) real data. Each comes with its own pros and cons. The post Data anonymization techniques defined: transforming real data into realistic test data appeared first on Security Boulevard. View the full article

  18. Get guidance on key tenets of the EU CRA and how Legit can help address them. The post Strengthening Software Security Under the EU Cyber Resilience Act: A High-Level Guide for Security Leaders and CISOs appeared first on Security Boulevard. View the full article

  19. via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Unstoppable Force And Immovable Object’ appeared first on Security Boulevard. View the full article

  20. IRONSCALES has extended the reach of the machine learning algorithms it uses to identify email anomalies to now include the video and audio files used to create deepfakes. The post IRONSCALES Extends Email Security Platform to Combat Deepfakes appeared first on Security Boulevard. View the full article

  21. In recent weeks, the UK retail sector has been rocked by a series of high-profile cyberattacks, targeting major players such as Marks & Spencer (M&S), Harrods, and the Co-operative Group. Read More The post The Surge in Cyberattacks on UK Retailers: Understanding the Threat and Navigating the Future appeared first on Axio. The post The Surge in Cyberattacks on UK Retailers: Understanding the Threat and Navigating the Future appeared first on Security Boulevard. View the full article

  22. GitGuardian launches new NHI Governance, enhanced synergies with Secret Manager integrations, smarter context analysis, container registry scanning, historical scanning for Jira & Confluence, and more. Take control of your secrets security, and machine identities. The post Q1 2025 Recap: GitGuardian Doubles Down on Secrets Security and Machine Identity Control appeared first on Security Boulevard. View the full article

  23. Author/Presenter: Craig Lester Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Proving Ground – An Adversarial Approach To Airline Revenue Management appeared first on Security Boulevard. View the full article

  24. At Seceon, we’ve always believed that solving cybersecurity isn’t about adding more tools but building smarter ones. That belief was validated in a big way this year at RSAC 2025, where we proudly took home three Global Infosec Awards. 🏆 Best Comprehensive Cybersecurity Platform🏆 Best SMB Managed Security Services Platform (for aiSecurity-CGuard)🏆 Best XDR Platform The post Seceon Wins Three Global Infosec Awards at RSAC 2025 appeared first on Seceon Inc. The post Seceon Wins Three Global Infosec Awards at RSAC 2025 appeared first on Security Boulevard. View the full article

  25. A 25-year-old California man will plead guilty to hacking into a Disney's personal computer and using stolen credentials to break into thousands of Disney Slack channels. Ryan Mitchell Kramer, who claimed to be a member of the Russian group NullBulge, then leaked the data when the victim didn't respond to his emails. The post California Man Will Plead Guilty to Last Year’s Disney Hack appeared first on Security Boulevard. View the full article

  26. Navigating the path to ISO 27001 certification resembles assembling IKEA flat-pack furniture. Each piece is essential, but the sparse instructions can leave you scratching your head. Sure, both ISO and IKEA have Scandinavian roots, but when it comes to security standards, you’ll probably need more than minimalist-style advice. This guide offers a comprehensive, step-by-step breakdown […] The post The Ultimate ISO 27001 Checklist: Step-by-Step Guide to Simplify Your Compliance Journey appeared first on Centraleyes. The post The Ultimate ISO 27001 Checklist: Step-by-Step Guide to Simplify Your Compliance Journey appeared first on Security Boulevard. View the full article

  27. SAN FRANCISCO — The cybersecurity industry showed up here in force last week: 44,000 attendees, 730 speakers, 650 exhibitors and 400 members of the media flooding Moscone Convention Center in the City by the Bay. Related: RSAC 2025 by the … (more…) The post MY TAKE: RSAC 2025’s big takeaway — GenAI is growing up fast, but still needs human direction first appeared on The Last Watchdog. The post MY TAKE: RSAC 2025’s big takeaway — GenAI is growing up fast, but still needs human direction appeared first on Security Boulevard. View the full article

  28. If you avoid the pitfalls detailed in this article, then EASM can provide a great defense against two-thirds of your breach problem. The post Why EASM Projects Fail: Three Pitfalls to Avoid appeared first on Security Boulevard. View the full article

  29. Protecting client data and company secrets requires vendor help and an expert IT team to monitor databases. The post Are You Too Reliant on Third-Party Vendors for Cybersecurity? appeared first on Security Boulevard. View the full article

  30. There are many ways in which AI is increasing risk, extending beyond third parties to affect all aspects of our security programs. The post Beyond Traditional Vendor Management: Navigating AI Risks in the Supply Chain appeared first on Security Boulevard. View the full article

  31. Join us as we explore the transformative changes in software development and cybersecurity due to AI. We discuss new terminology like ‘vibe coding’ — a novel, behavior-focused development approach, and ‘MCP’ (Model Context Protocol) — an open standard for AI interfaces. We also address the concept of ‘slopsquatting,’ a new type of threat involving AI-generated […] The post What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development appeared first on Shared Security Podcast. The post What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development appeared first on Security Boulevard. View the full article

  32. Why is there a Need for Flexibility in Choosing the Right NHI Solutions? The need for well-rounded security measures is paramount. Undeniably, one of the key elements in crafting an effective cyber strategy revolves around Non-Human Identities (NHIs). Yet, with a myriad of options at our fingertips, how can organizations ensure they pick the most […] The post Flexibility in Choosing the Right NHIs Solutions appeared first on Entro. The post Flexibility in Choosing the Right NHIs Solutions appeared first on Security Boulevard. View the full article

  33. Just how secure are your Non-Human Identities? Have you ever questioned the security level of your Non-Human Identities (NHIs)? NHIs are often the unsung heroes, silently working behind-the-scenes to protect your digital fortress. But are you doing enough to safeguard these critical components? Understanding the World of Non-Human Identities NHIs are machine identities used. They […] The post Relax with Robust NHI Security Measures appeared first on Entro. The post Relax with Robust NHI Security Measures appeared first on Security Boulevard. View the full article

  34. Can Your Non-Human Identities Keep You Calm When It Comes to Data Security? Maintaining a sense of calm security might seem like a tall order. However, the management of Non-Human Identities (NHIs) and Secrets can be a game-changer in achieving this. But what exactly are NHIs, and how do they contribute to data safety? Decoding […] The post Stay Calm: Your NHIs Are Protecting You appeared first on Entro. The post Stay Calm: Your NHIs Are Protecting You appeared first on Security Boulevard. View the full article

  35. Author/Presenter: Paul Wortman Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Proving Ground – Taking D-Bus To Explore The Bluetooth Landscape appeared first on Security Boulevard. View the full article

  36. Ransomware isn’t a tech failure - it’s a market failure. If you think the hardest part is getting hacked, wait until the lawyers, insurers, and PR firms show up. The post Why Ransomware Isn’t Just a Technology Problem (It’s Worse) appeared first on Security Boulevard. View the full article

  37. Why is Satisfaction with NHIs Paramount in Security Expertise? When it comes to managing security, Non-Human Identities (NHIs) have become a critical focus for many CISOs and security professionals. This growing importance prompts the question: Why does satisfaction with NHIs play a significant role in demonstrating security expertise? Why NHIs are Essential for Security Management […] The post Why NHIs Leave Security Experts Satisfied appeared first on Entro. The post Why NHIs Leave Security Experts Satisfied appeared first on Security Boulevard. View the full article

  38. Are Your Non-Human Identities Prepared for Emerging Cybersecurity Threats? Understanding the readiness and response efficiency of your Non-Human Identities (NHIs) to new cybersecurity threats is crucial. This post seeks to shed light on the criticality of managing NHIs robustly and how it aids businesses in minimizing data breaches and improving overall cybersecurity. What Sets NHIs […] The post Are Your NHIs Capable of Handling New Threats? appeared first on Entro. The post Are Your NHIs Capable of Handling New Threats? appeared first on Security Boulevard. View the full article

  39. Author/Presenter: Jason Odoom Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post Bsideslv24 – Proving Ground – Unleashing The Future Of Development: The Secret World Of Nix & Flakes appeared first on Security Boulevard. View the full article

  40. CMMC mandates that companies working as part of the government supply line need to comply with a level of security determined by their handling of controlled information. Identifying the level of compliance necessary for your business is the first step in achieving that compliance. The second step is scoping. All About Scoping for CMMC What […] The post How to Handle CMMC Scoping for Remote Employees appeared first on Security Boulevard. View the full article

  41. Why Are NHIs Crucial for IT Stability? How often do we consider Non-Human Identities (NHIs) and their role in IT stability? Many organizations are unaware of the strategic importance of NHI management. With more businesses adopt cloud-based solutions, the science of managing and protecting these machine identities becomes paramount. Understanding the Significance of NHIs and […] The post How NHIs Contribute to IT Stability appeared first on Entro. The post How NHIs Contribute to IT Stability appeared first on Security Boulevard. View the full article

  42. The Proactive Cyber Defense: Why Embrace NHIs? How often do you consider the role of Non-Human Identities (NHIs)? The significance of NHIs cannot be downplayed. Ensuring the security of these machine identities or NHIs is a cornerstone for a proactive cyber defense strategy. Delving into Non-Human Identities NHIs refer to machine identities used in cybersecurity. […] The post Being Proactive with NHIs in Cyber Defense appeared first on Entro. The post Being Proactive with NHIs in Cyber Defense appeared first on Security Boulevard. View the full article

  43. Does Your Cybersecurity Strategy Justify NHI Costs? Organizations must frequently evaluate their strategies to ascertain if the costs of implementing and maintaining specific security measures are justified. The scenario is no different when it comes to Non-Human Identities (NHIs) and their associated costs. So, is the investment in NHI management justified? The answer, quite simply, […] The post Are Expenditures on NHI Justified? appeared first on Entro. The post Are Expenditures on NHI Justified? appeared first on Security Boulevard. View the full article

  44. Author/Presenter: Randall Wyatt Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Proving Ground – You Can Be Neurodivergent And Succeed In InfoSec appeared first on Security Boulevard. View the full article

  45. In a world where credential breaches cost companies millions, strong authentication isn't optional—it's essential. This comprehensive guide breaks down seven critical domains of identity security into actionable strategies that protect your systems without sacrificing user experience. The post Best Practices for User Authentication and Authorization in Web Applications: A Comprehensive Security Framework appeared first on Security Boulevard. View the full article

  46. Sooner or later, it’s going to happen. AI systems will start acting as agents, doing things on our behalf with some degree of autonomy. I think it’s worth thinking about the security of that now, while its still a nascent idea. In 2019, I joined Inrupt, a company that is commercializing Tim Berners-Lee’s open protocol for distributed data ownership. We are working on a digital wallet that can make use of AI in this way. (We used to call it an “active wallet.” Now we’re calling it an “agentic wallet.”) I talked about this a bit at the RSA Conference... The post Privacy for Agentic AI appeared first on Security Boulevard. View the full article

  47. In the digital healthcare landscape, electronic health records (EHRs) are foundational to patient care, operational efficiency and regulatory compliance. The post Enhancing EHR Security: Best Practices for Protecting Patient Data appeared first on Security Boulevard. View the full article

  48. With the right cloud database architecture, you gain versatility as well as optimal security. The post The Cloud Illusion: Why Your Database Security Might Be at Risk appeared first on Security Boulevard. View the full article

  49. Penetration testing is vital to keeping your business safe in today’s digital landscape, where cyber threats are ever present. It ensures your business’s sensitive data is protected, validating the robustness of the defensive measures your business has implemented. With cyber attacks on the rise, proactive measures like penetration testing (also known as ethical hacking) aren’t… The post Preparing your business for a penetration test appeared first on Sentrium Security. The post Preparing your business for a penetration test appeared first on Security Boulevard. View the full article

  50. Author/Presenter: Larissa Fonseca Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post BSidesLV24 – Proving Ground – And What If It Was Hacked? Tactics And Impacts Of Adversarial Machine Learning appeared first on Security Boulevard. View the full article