Normal view

Received today — 14 February 2026Security Boulevard

Identity Risk Scoring Only Works If Attribution Is Defensible

14 February 2026 at 15:53

Identity risk scoring has become a critical input for fraud prevention, security operations, and trust decisions. Organizations increasingly rely on risk scores to decide when to step up authentication, block access, or flag activity for investigation. But despite widespread adoption, many identity risk programs struggle with the same problem: Risk scores are generated, but teams …

The post Identity Risk Scoring Only Works If Attribution Is Defensible appeared first on Security Boulevard.

NDSS 2025 – Black-Box Membership Inference Attacks Against Fine-Tuned Diffusion Models

14 February 2026 at 11:00

Session 12C: Membership Inference

Authors, Creators & Presenters: Yan Pang (University of Virginia), Tianhao Wang (University of Virginia)

PAPER
Black-box Membership Inference Attacks against Fine-tuned Diffusion Models

With the rapid advancement of diffusion-based image-generative models, the quality of generated images has become increasingly photorealistic. Moreover, with the release of high-quality pre-trained image-generative models, a growing number of users are downloading these pre-trained models to fine-tune them with downstream datasets for various image-generation tasks. However, employing such powerful pre-trained models in downstream tasks presents significant privacy leakage risks. In this paper, we propose the first scores-based membership inference attack framework tailored for recent diffusion models, and in the more stringent black-box access setting. Considering four distinct attack scenarios and three types of attacks, this framework is capable of targeting any popular conditional generator model, achieving high precision, evidenced by an impressive AUC of 0.95.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.


Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – Black-Box Membership Inference Attacks Against Fine-Tuned Diffusion Models appeared first on Security Boulevard.

Best Penetration Testing Companies in USA

14 February 2026 at 01:50

Cyber threats are growing at an unprecedented pace. In 2024 alone, global cyber threat losses reached an estimated US$9.5 trillion, and this figure is projected to rise even further in 2025. If threats were a country, it would rank as the world’s third-largest economy, behind only the United States and China. As attackers increasingly leverage […]

The post Best Penetration Testing Companies in USA appeared first on Kratikal Blogs.

The post Best Penetration Testing Companies in USA appeared first on Security Boulevard.

How do NHIs add value to cloud compliance auditing?

13 February 2026 at 17:00

What Makes Non-Human Identities Essential for Cloud Compliance Auditing? With cybersecurity threats evolve, how can organizations ensure their compliance measures are robust enough to handle the complexities of modern cloud environments? The answer lies in understanding and managing Non-Human Identities (NHIs)—a crucial component for establishing a secure and compliant framework in cloud computing. Understanding NHIs: […]

The post How do NHIs add value to cloud compliance auditing? appeared first on Entro.

The post How do NHIs add value to cloud compliance auditing? appeared first on Security Boulevard.

How can cloud-native security be transformed by Agentic AI?

13 February 2026 at 17:00

How do Non-Human Identities Shape the Future of Cloud Security? Have you ever wondered how machine identities influence cloud security? Non-Human Identities (NHIs) are crucial for maintaining robust cybersecurity frameworks, especially in cloud environments. These identities demand a sophisticated understanding, when they are essential for secure interactions between machines and their environments. The Critical Role […]

The post How can cloud-native security be transformed by Agentic AI? appeared first on Entro.

The post How can cloud-native security be transformed by Agentic AI? appeared first on Security Boulevard.

What future-proof methods do Agentic AIs use in data protection?

13 February 2026 at 17:00

How Secure Is Your Organization’s Cloud Environment? How secure is your organization’s cloud environment? With the digital transformation accelerates, gaps in security are becoming increasingly noticeable. Non-Human Identities (NHIs), representing machine identities, are pivotal in these frameworks. In cybersecurity, they are formed by integrating a ‘Secret’—like an encrypted password or key—and the permissions allocated by […]

The post What future-proof methods do Agentic AIs use in data protection? appeared first on Entro.

The post What future-proof methods do Agentic AIs use in data protection? appeared first on Security Boulevard.

Is Agentic AI driven security scalable for large enterprises?

13 February 2026 at 17:00

How Can Non-Human Identities (NHIs) Transform Scalable Security for Large Enterprises? One might ask: how can large enterprises ensure scalable security without compromising on efficiency and compliance? The answer lies in the effective management of Non-Human Identities (NHIs) and secrets security management. With machine identities, NHIs are pivotal in crafting a robust security framework, especially […]

The post Is Agentic AI driven security scalable for large enterprises? appeared first on Entro.

The post Is Agentic AI driven security scalable for large enterprises? appeared first on Security Boulevard.

Received yesterday — 13 February 2026Security Boulevard

Survey: Most Security Incidents Involve Identity Attacks

13 February 2026 at 15:55

A survey of 512 cybersecurity professionals finds 76% report that over half (54%) of the security incidents that occurred in the past 12 months involved some issue relating to identity management. Conducted by Permiso Security, a provider of an identity security platform, the survey also finds 95% are either very confident (52%) or somewhat confident..

The post Survey: Most Security Incidents Involve Identity Attacks appeared first on Security Boulevard.

NDSS 2025 – Automated Mass Malware Factory

13 February 2026 at 15:00

Session 12B: Malware

Authors, Creators & Presenters: Heng Li (Huazhong University of Science and Technology), Zhiyuan Yao (Huazhong University of Science and Technology), Bang Wu (Huazhong University of Science and Technology), Cuiying Gao (Huazhong University of Science and Technology), Teng Xu (Huazhong University of Science and Technology), Wei Yuan (Huazhong University of Science and Technology), Xiapu Luo (The Hong Kong Polytechnic University)

PAPER
Automated Mass Malware Factory: The Convergence of Piggybacking and Adversarial Example in Android Malicious Software Generation

Adversarial example techniques have been demonstrated to be highly effective against Android malware detection systems, enabling malware to evade detection with minimal code modifications. However, existing adversarial example techniques overlook the process of malware generation, thus restricting the applicability of adversarial example techniques. In this paper, we investigate piggybacked malware, a type of malware generated in bulk by piggybacking malicious code into popular apps, and combine it with adversarial example techniques. Given a malicious code segment (i.e., a rider), we can generate adversarial perturbations tailored to it and insert them into any carrier, enabling the resulting malware to evade detection. Through exploring the mechanism by which adversarial perturbation affects piggybacked malware code, we propose an adversarial piggybacked malware generation method, which comprises three modules: Malicious Rider Extraction, Adversarial Perturbation Generation, and Benign Carrier Selection. Extensive experiments have demonstrated that our method can efficiently generate a large volume of malware in a short period, and significantly increase the likelihood of evading detection. Our method achieved an average attack success rate (ASR) of 88.3% on machine learning-based detection models (e.g., Drebin and MaMaDroid), and an ASR of 76% and 92% on commercial engines Microsoft and Kingsoft, respectively. Furthermore, we have explored potential defenses against our adversarial piggybacked malware.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.


Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – Automated Mass Malware Factory appeared first on Security Boulevard.

Why PAM Implementations Struggle 

13 February 2026 at 13:41

Privileged Access Management (PAM) is widely recognized as a foundational security control for Zero Trust, ransomware prevention, and compliance with frameworks such as NIST, ISO 27001, and SOC 2. Yet despite heavy investment, many organizations struggle to realize the promised value of PAM. Projects stall, adoption remains low, and security teams are left managing complex systems that deliver limited risk reduction.  […]

The post Why PAM Implementations Struggle  appeared first on 12Port.

The post Why PAM Implementations Struggle  appeared first on Security Boulevard.

The Rise of Continuous Penetration Testing-as-a-Service (PTaaS)

13 February 2026 at 11:11

Traditional penetration testing has long been a cornerstone of cyber assurance. For many organisations, structured annual or biannual tests have provided an effective way to validate security controls, support compliance requirements, and identify material weaknesses across infrastructure, applications, and external attack surfaces. However, enterprise environments now change at a pace that is difficult to reconcile…

The post The Rise of Continuous Penetration Testing-as-a-Service (PTaaS) appeared first on Sentrium Security.

The post The Rise of Continuous Penetration Testing-as-a-Service (PTaaS) appeared first on Security Boulevard.

NDSS 2025 – Density Boosts Everything

13 February 2026 at 11:00

Session 12B: Malware

Authors, Creators & Presenters: Jianwen Tian (Academy of Military Sciences), Wei Kong (Zhejiang Sci-Tech University), Debin Gao (Singapore Management University), Tong Wang (Academy of Military Sciences), Taotao Gu (Academy of Military Sciences), Kefan Qiu (Beijing Institute of Technology), Zhi Wang (Nankai University), Xiaohui Kuang (Academy of Military Sciences)

PAPER
Density Boosts Everything: A One-stop Strategy For Improving Performance, Robustness, And Sustainability of Malware Detectors

In the contemporary landscape of cybersecurity, AI-driven detectors have emerged as pivotal in the realm of malware detection. However, existing AI-driven detectors encounter a myriad of challenges, including poisoning attacks, evasion attacks, and concept drift, which stem from the inherent characteristics of AI methodologies. While numerous solutions have been proposed to address these issues, they often concentrate on isolated problems, neglecting the broader implications for other facets of malware detection. This paper diverges from the conventional approach by not targeting a singular issue but instead identifying one of the fundamental causes of these challenges, sparsity. Sparsity refers to a scenario where certain feature values occur with low frequency, being represented only a minimal number of times across the dataset. The authors are the first to elevate the significance of sparsity and link it to core challenges in the domain of malware detection, and then aim to improve performance, robustness, and sustainability simultaneously by solving sparsity problems. To address the sparsity problems, a novel compression technique is designed to effectively alleviate the sparsity. Concurrently, a density boosting training method is proposed to consistently fill sparse regions. Empirical results demonstrate that the proposed methodologies not only successfully bolster the model's resilience against different attacks but also enhance the performance and sustainability over time. Moreover, the proposals are complementary to existing defensive technologies and successfully demonstrate practical classifiers with improved performance and robustness to attacks.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.


Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – Density Boosts Everything appeared first on Security Boulevard.

How to find and remove credential-stealing Chrome extensions

13 February 2026 at 08:27

Researchers have uncovered 30 Chrome extensions stealing user data. Here’s how to check your browser and remove any malicious extensions step by step.

The post How to find and remove credential-stealing Chrome extensions appeared first on Security Boulevard.

The Law of Cyberwar is Pretty Discombobulated

13 February 2026 at 05:24
cyberwar, cyber, SLA, cyberattack, retailers, Ai, applications, sysdig, attack, cisco, AI, AI-powered, attacks, attackers, security, BreachRx, Cisco, Nexus, security, challenges, attacks, cybersecurity, risks, industry, Cisco Talos hackers legitimate tools used in cyberattacks

This article explores the complexities of cyberwarfare, emphasizing the need to reconsider how we categorize cyber operations within the framework of the Law of Armed Conflict (LOAC). It discusses the challenges posed by AI in transforming traditional warfare notions and highlights the potential risks associated with the misuse of emerging technologies in conflicts.

The post The Law of Cyberwar is Pretty Discombobulated appeared first on Security Boulevard.

What is a SAML Assertion in Single Sign-On?

Learn what a SAML assertion is in Single Sign-On. Discover how these XML trust tokens securely exchange identity data between IdPs and Service Providers.

The post What is a SAML Assertion in Single Sign-On? appeared first on Security Boulevard.

Top Security Incidents of 2025:  The Emergence of the ChainedShark APT Group

13 February 2026 at 03:11

In 2025, NSFOCUS Fuying Lab disclosed a new APT group targeting China’s scientific research sector, dubbed “ChainedShark” (tracking number: Actor240820). Been active since May 2024, the group’s operations are marked by high strategic coherence and technical sophistication. Its primary targets are professionals in Chinese universities and research institutions specializing in international relations, marine technology, and related […]

The post Top Security Incidents of 2025:  The Emergence of the ChainedShark APT Group appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

The post Top Security Incidents of 2025:  The Emergence of the ChainedShark APT Group appeared first on Security Boulevard.

150+ Key Compliance Statistics: AI, Data Privacy, Cybersecurity & Regulatory Trends to Know in 2026

13 February 2026 at 02:40

In 2026, compliance sits at the intersection of AI adoption, expanding privacy regulations, and rising cybersecurity risk. As regulatory expectations tighten and digital systems grow more complex, organizations are under.

The post 150+ Key Compliance Statistics: AI, Data Privacy, Cybersecurity & Regulatory Trends to Know in 2026 appeared first on Indusface.

The post 150+ Key Compliance Statistics: AI, Data Privacy, Cybersecurity & Regulatory Trends to Know in 2026 appeared first on Security Boulevard.

How AutoSecT VMDR Tool Simplifies Vulnerability Management

13 February 2026 at 02:22

As it is said, the ‘why’ and ‘how’ is much important than ‘should’. It’s exactly applicable in today’s cyberspace. Every day, organizations survive in an unpredictable cyber-risk climate. If your defense storehouse comprises just fragmented tools and manual processes, you are not playing it safe. If you are ‘not safe’, you are just seconds away […]

The post How AutoSecT VMDR Tool Simplifies Vulnerability Management appeared first on Kratikal Blogs.

The post How AutoSecT VMDR Tool Simplifies Vulnerability Management appeared first on Security Boulevard.

Examples of SAML Providers

Explore top examples of SAML providers like Okta, Azure AD, and Ping Identity. Learn how to implement SAML SSO for secure enterprise identity management.

The post Examples of SAML Providers appeared first on Security Boulevard.

Demystifying SAML: The Basics of Secure Single Sign-On

Learn the basics of SAML authentication for Enterprise SSO. Understand IdP vs SP roles, XML assertions, and how to secure your B2B infrastructure effectively.

The post Demystifying SAML: The Basics of Secure Single Sign-On appeared first on Security Boulevard.

Understanding Authentication Methods

Deep dive into authentication methods for B2B. Learn about SAML, OIDC, FIDO2, and passwordless flows to secure your enterprise apps and prevent data breaches.

The post Understanding Authentication Methods appeared first on Security Boulevard.

Understanding WS-Trust: A Guide to Secure Token Exchange

Deep dive into WS-Trust for enterprise identity. Learn about STS, token exchange, and secure SSO integration for modern B2B platforms.

The post Understanding WS-Trust: A Guide to Secure Token Exchange appeared first on Security Boulevard.

RFC 4058 – Authentication Protocol Overview

A deep dive into RFC 4058 authentication protocols for software development. Learn about key management, security requirements, and modern ciam implementation.

The post RFC 4058 – Authentication Protocol Overview appeared first on Security Boulevard.

Securing Agentic AI Connectivity

12 February 2026 at 17:50

 

Securing Agentic AI Connectivity

AI agents are no longer theoretical, they are here, powerful, and being connected to business systems in ways that introduce cybersecurity risks! They’re calling APIs, invoking MCPs, reasoning across systems, and acting autonomously in production environments, right now.

And here’s the problem nobody has solved: identity and access controls tell you WHO is acting, but not WHY.

An AI agent can be fully authenticated, fully authorized, and still be completely misaligned with the intent that justified its access. That’s not a failure of your tools. That’s a gap in the entire security model.

This is the problem ArmorIQ was built to solve.

ArmorIQ secures agentic AI at the intent layer, where it actually matters:

· Intent-Bound Execution: Every agent action must trace back to an explicit, bounded plan. If the reasoning drifts, trust is revoked in real time.

· Scoped Delegation Controls: When agents delegate to other agents or invoke tools via MCPs and APIs, authority is constrained and temporary. No inherited trust. No implicit permissions.

· Purpose-Aware Governance: Access isn’t just granted and forgotten. It expires when intent expires. Trust is situational, not permanent.

If you’re a CISO, security architect, or board leader navigating agentic AI risk — this is worth your attention.

See what ArmorIQ is building: https://armoriq.io

The post Securing Agentic AI Connectivity appeared first on Security Boulevard.

Received before yesterdaySecurity Boulevard

Can AI-driven architecture significantly enhance SOC team efficiency?

12 February 2026 at 17:00

How Can Non-Human Identities Revolutionize Cybersecurity? Have you ever considered the challenges that arise when managing thousands of machine identities? Where organizations migrate to the cloud, the need for robust security systems becomes paramount. Enter Non-Human Identities (NHIs) — the unsung heroes of cybersecurity that can revolutionize how secure our clouds are. Managing NHIs, which […]

The post Can AI-driven architecture significantly enhance SOC team efficiency? appeared first on Entro.

The post Can AI-driven architecture significantly enhance SOC team efficiency? appeared first on Security Boulevard.

How do Agentic AI systems ensure robust cloud security?

12 February 2026 at 17:00

How Can Non-Human Identities Transform Cloud Security? Is your organization leveraging the full potential of Non-Human Identities (NHIs) to secure your cloud infrastructure? While we delve deeper into increasingly dependent on digital identities, NHIs are pivotal in shaping robust cloud security frameworks. Unlike human identities, NHIs are digital constructs that transcend traditional login credentials, encapsulating […]

The post How do Agentic AI systems ensure robust cloud security? appeared first on Entro.

The post How do Agentic AI systems ensure robust cloud security? appeared first on Security Boulevard.

What role do NHIs play in privileged access management?

12 February 2026 at 17:00

Could the Future of Privileged Access Management Lie in Non-Human Identities? Where the number of machine identities is rapidly expanding, the need for advanced management solutions becomes more pressing. Enter Non-Human Identities (NHIs), a compelling concept in cybersecurity that addresses this burgeoning requirement. Where businesses transition more functions to the cloud, understanding the strategic role […]

The post What role do NHIs play in privileged access management? appeared first on Entro.

The post What role do NHIs play in privileged access management? appeared first on Security Boulevard.

What makes Non-Human Identities safe in healthcare data?

12 February 2026 at 17:00

How Can Organizations Safeguard Non-Human Identities in Healthcare Data? Have you ever considered the importance of machine identities in your cybersecurity strategy? The healthcare sector, with its vast arrays of sensitive information, relies heavily on these machine identities, known as Non-Human Identities (NHIs), to streamline operations and safeguard data. This article delves into how NHIs […]

The post What makes Non-Human Identities safe in healthcare data? appeared first on Entro.

The post What makes Non-Human Identities safe in healthcare data? appeared first on Security Boulevard.

The Agentic Virus: How AI Agents Become Self-Spreading Malware

12 February 2026 at 15:02

In my previous post, I walked through how disconnected MCP servers and AI agents create a growing blind spot in enterprise identity. The problem: thousands of MCP deployments running with overly broad tokens, no authentication, and no connection to your identity fabric. The solution: federate everything through the Maverics AI Identity Gateway. That post assumed...

The post The Agentic Virus: How AI Agents Become Self-Spreading Malware appeared first on Strata.io.

The post The Agentic Virus: How AI Agents Become Self-Spreading Malware appeared first on Security Boulevard.

NDSS 2025 – PBP: Post-Training Backdoor Purification For Malware Classifiers

12 February 2026 at 15:00

Session 12B: Malware

Authors, Creators & Presenters: Dung Thuy Nguyen (Vanderbilt University), Ngoc N. Tran (Vanderbilt University), Taylor T. Johnson (Vanderbilt University), Kevin Leach (Vanderbilt University)

PAPER
PBP: Post-Training Backdoor Purification for Malware Classifiers

In recent years, the rise of machine learning (ML) in cybersecurity has brought new challenges, including the increasing threat of backdoor poisoning attacks on ML malware classifiers. These attacks aim to manipulate model behavior when provided with a particular input trigger. For instance, adversaries could inject malicious samples into public malware repositories, contaminating the training data and potentially misclassifying malware by the ML model. Current countermeasures predominantly focus on detecting poisoned samples by leveraging disagreements within the outputs of a diverse set of ensemble models on training data points. However, these methods are not applicable in scenarios involving ML-as-a-Service (MLaaS) or for users who seek to purify a backdoored model post-training. Addressing this scenario, we introduce PBP, a post-training defense for malware classifiers that mitigates various types of backdoor embeddings without assuming any specific backdoor embedding mechanism. Our method exploits the influence of backdoor attacks on the activation distribution of neural networks, independent of the trigger-embedding method. In the presence of a backdoor attack, the activation distribution of each layer is distorted into a mixture of distributions. By regulating the statistics of the batch normalization layers, we can guide a backdoored model to perform similarly to a clean one. Our method demonstrates substantial advantages over several state-of-the-art methods, as evidenced by experiments on two datasets, two types of backdoor methods, and various attack configurations. Our experiments showcase that PBP can mitigate even the SOTA backdoor attacks for malware classifiers, e.g., Jigsaw Puzzle, which was previously demonstrated to be stealthy against existing backdoor defenses. Notably, your approach requires only a small portion of the training data -- only 1% -- to purify the backdoor and reduce the attack success rate from 100% to almost 0%, a 100-fold improvement over the baseline methods.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.


Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – PBP: Post-Training Backdoor Purification For Malware Classifiers appeared first on Security Boulevard.

MSP Strategic Defense: Where Prevention Meets Compliance

12 February 2026 at 13:52

Imagine a modern office building. Not everyone who works there can go everywhere. Employees can access the building entrance, their own floor, and the meeting rooms they need, but they can’t (and shouldn’t be able to) walk into the server room, access executive offices, or wander freely across every floor. This may seem restrictive, but it’s simply how safety and order are maintained.

The post MSP Strategic Defense: Where Prevention Meets Compliance appeared first on Security Boulevard.

4 Tools That Help Students Focus

12 February 2026 at 13:37

Educators recognize the dual reality of educational technology (EdTech): its potential to sharpen student focus and detract from it. Schools must proactively leverage technology’s advantages while mitigating its risks to student productivity. Read on as we unpack the evolving importance and challenge of supporting student focus. We also detail four categories of classroom focus tools, ...

The post 4 Tools That Help Students Focus appeared first on ManagedMethods Cybersecurity, Safety & Compliance for K-12.

The post 4 Tools That Help Students Focus appeared first on Security Boulevard.

42,900 OpenClaw Exposed Control Panels and Why You Should Care

12 February 2026 at 09:47

Over the past two weeks, most coverage around Moltbot and OpenClaw has chased the flashy angle. One-click exploits, remote code execution, APT chatter, scary screenshots. Meanwhile, security teams are doing...

The post 42,900 OpenClaw Exposed Control Panels and Why You Should Care appeared first on Strobes Security.

The post 42,900 OpenClaw Exposed Control Panels and Why You Should Care appeared first on Security Boulevard.

Outlook add-in goes rogue and steals 4,000 credentials and payment data

12 February 2026 at 09:35

The once popular Outlook add-in AgreeTo was turned into a powerful phishing kit after the developer abandoned the project.

The post Outlook add-in goes rogue and steals 4,000 credentials and payment data appeared first on Security Boulevard.

Gartner® Names Tenable as the Current Company to Beat for AI-Powered Exposure Assessment in a 2025 Report

12 February 2026 at 08:45

“Tenable’s asset and attack surface coverage, its application of AI and its reputation for vulnerability assessment makes it the front-runner in AI-powered exposure assessment,” Gartner writes in “AI Vendor Race: Tenable Is the Company to Beat for AI-Powered Exposure Assessment.”

Key Takeaways from Tenable:

  1. This is the latest among a recent string of recognitions Tenable One has received from independent analyst firms for being one of the leading exposure management platforms.
  2. Tenable One’s advanced and comprehensive use of AI allows it to automate complex attack path analysis, prioritization, and remediation workflows.
  3. The new Tenable One AI Exposure enables organizations to discover, govern, and secure AI assets across hybrid environments within a single unified platform.

To protect today’s expanding attack surface, organizations need to adopt an exposure management platform that holistically and proactively secures all types of assets everywhere: cloud workloads, on-prem servers, operational technology (OT) systems, IoT devices, artificial intelligence tools, and more.

And in order to continuously detect, correlate, and analyze all of these assets’ exposures – including vulnerabilities, misconfigurations, identity flaws, and unprotected data – your exposure management platform must have robust AI capabilities.

That’s exactly how we’ve built the Tenable One exposure management platform. Today, we’re proud to share the latest recognition for Tenable One.

In its recent publication “AI Vendor Race: Tenable Is the Company to Beat for AI-Powered Exposure Management” (accessible to Gartner clients only), Gartner had this to say about Tenable’s standing in the exposure assessment platform (EAP) space:

“Tenable achieved its front-runner status in EAP by not only leveraging its long-standing dominance in vulnerability assessment but also combining its strong asset and attack surface discovery capabilities, support for third-party telemetry ingestion and AI. Tenable ingests asset and exposure data across the attack surface for cross-domain context beyond vulnerabilities and applies AI to enhance prioritization, analyze attack paths and enable greater automation.”

Gartner further wrote:

“Tenable One is a well-integrated platform that spans traditional IT, identity, cloud, cyber-physical systems (CPS) and container environments. Tenable’s expanded product suite, strengthened by a series of strategic acquisitions, distinguishes itself through extensibility across both traditional and nontraditional domains. This broad coverage delivers unmatched reach for onboarding and securing unmanaged assets, ensuring comprehensive visibility across the entire digital landscape.”

How Tenable One uses AI to supercharge exposure management

At Tenable, we believe that an AI-driven exposure management platform lets you preemptively and comprehensively discover, prioritize, and remediate your greatest cyber risks, protecting you against increasingly aggressive and sophisticated cyber attacks.

That’s why AI capabilities are part of the DNA of Tenable One, and we feel this is making it the one clear leader in exposure management and helping security teams to move from reactive firefighting to proactive risk management. Here’s a snapshot of just a few key ways in which Tenable One leverages AI to leave competitors in the rearview mirror:

  • Illuminates attack paths: We use AI to contextualize threats and identify likely attack routes based on asset criticality, severity, business impact, and exploitation likelihood.
  • Automates fixes: The platform also utilizes AI to drive workflow automation, identifying the correct asset owners, populating tailored remediation guidance, and even auto-creating tickets in third-party systems. It automates aspects of patch management entirely, handling deployment and post-patch verification.
  • Sees the whole picture: By ingesting third-party telemetry and combining it with its own scanned data, Tenable One creates cross-domain context that fuels its AI capabilities, resulting in sharper prioritization and more comprehensive risk assessments.

In short, thanks to its extensive and sophisticated use of AI for cybersecurity, Tenable One provides a cohesive, integrated view of your entire hybrid environment and protects your sprawling and complex attack surface.

How Tenable One secures your AI assets

Tenable One uses AI for security to fuel your entire exposure management program, and that includes protecting the AI tools your organization uses to optimize your operations, including human resources, finance, sales, product development and marketing.

As organizations rush to leverage generative AI and autonomous agents, they often introduce significant vulnerabilities – ranging from shadow AI usage to misconfigured models – that bypass standard security controls. This lack of visibility creates dangerous blind spots, making the ability to accurately assess and prioritize AI-related exposures a top priority. 

At Tenable, we call this the AI exposure management gap. This gap, which traditional security tools are ill-equipped to handle, stems from the pervasive and often invisible nature of AI adoption, leading to three critical risks:

  • Unknown footprint: Security teams often lack visibility into shadow AI, forgotten deployments and other AI assets that expand the attack surface beyond managed perimeters.
  • Hidden attack paths: AI workloads create complex webs of interconnected apps, APIs, and identities. Misconfigurations and overprivileged access within these networks create high-impact attack vectors that standard tools cannot detect.
  • Data exposure: Continuous interactions—such as prompts and uploads—can inadvertently leak sensitive intellectual property or customer data.

Ultimately, without proper guardrails and visibility, everyday AI usage transforms into a significant, unmanaged security liability.

Tenable believes that you must stop treating AI risk like a separate cybersecurity problem. That’s why we recently launched Tenable One AI Exposure, which gives you a unified view to see, secure, and manage AI-related exposures alongside IT, cloud, identity, and OT.

Tenable One AI Exposure is built on three pillars:

  • Discovery of AI assets
  • Protection of AI workloads and agents
  • AI usage governance

With Tenable One AI Exposure, you get a complete, risk-aware view of where AI exists, how it is connected, and where exposure begins. By providing unified visibility, contextualized signals, clear exposure communication, and fast, actionable outcomes, Tenable One lets you embrace AI confidently. 

New to Tenable? Request a Tenable One AI Exposure demo today. Existing customer? Reach out to your account team to expand your Tenable One coverage to include AI Exposure.

Source: Gartner, AI Vendor Race: Tenable Is the Company to Beat for AI-Powered Exposure Management(Accessible to Gartner Subscribers), by Elizabeth Kim, et al, December 8, 2025 

Gartner is a trademark of Gartner, Inc. and/or its affiliates. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

The post Gartner® Names Tenable as the Current Company to Beat for AI-Powered Exposure Assessment in a 2025 Report appeared first on Security Boulevard.

Reducing Alert Fatigue Using AI: From Overwhelmed SOCs to Autonomous Precision

12 February 2026 at 07:27

How Artificial Intelligence Transforms Security Operations Security Operations Centers (SOCs) face a growing operational challenge: overwhelming alert volumes. Modern enterprise environments generate thousands of security notifications daily across endpoint, network, identity, cloud, and application layers. This continuous stream of alerts creates what the industry describes as alert fatigue, a condition where analysts are overwhelmed by

The post Reducing Alert Fatigue Using AI: From Overwhelmed SOCs to Autonomous Precision appeared first on Seceon Inc.

The post Reducing Alert Fatigue Using AI: From Overwhelmed SOCs to Autonomous Precision appeared first on Security Boulevard.

❌