Normal view

Received yesterday — 13 February 2026

Survey: Most Security Incidents Involve Identity Attacks

13 February 2026 at 15:55

A survey of 512 cybersecurity professionals finds 76% report that over half (54%) of the security incidents that occurred in the past 12 months involved some issue relating to identity management. Conducted by Permiso Security, a provider of an identity security platform, the survey also finds 95% are either very confident (52%) or somewhat confident..

The post Survey: Most Security Incidents Involve Identity Attacks appeared first on Security Boulevard.

The Law of Cyberwar is Pretty Discombobulated

13 February 2026 at 05:24
cyberwar, cyber, SLA, cyberattack, retailers, Ai, applications, sysdig, attack, cisco, AI, AI-powered, attacks, attackers, security, BreachRx, Cisco, Nexus, security, challenges, attacks, cybersecurity, risks, industry, Cisco Talos hackers legitimate tools used in cyberattacks

This article explores the complexities of cyberwarfare, emphasizing the need to reconsider how we categorize cyber operations within the framework of the Law of Armed Conflict (LOAC). It discusses the challenges posed by AI in transforming traditional warfare notions and highlights the potential risks associated with the misuse of emerging technologies in conflicts.

The post The Law of Cyberwar is Pretty Discombobulated appeared first on Security Boulevard.

Received before yesterday

Survey: Widespread Adoption of AI Hasn’t Yet Reduced Cybersecurity Burnout

11 February 2026 at 15:41

A global survey of 1,813 IT and cybersecurity professionals finds that despite the rise of artificial intelligence (AI) and automation, cybersecurity teams still spend on average 44% of their time on manual or repetitive work. Conducted by Sapio Research on behalf of Tines, a provider of an automation platform, the survey also notes that as..

The post Survey: Widespread Adoption of AI Hasn’t Yet Reduced Cybersecurity Burnout appeared first on Security Boulevard.

Survey Sees Little Post-Quantum Computing Encryption Progress

10 February 2026 at 17:15

A global survey of 4,149 IT and security practitioners finds that while three-quarters (75%) expect a quantum computer will be capable of breaking traditional public key encryption within five years, only 38% at this point in time are preparing to adopt post-quantum cryptography. Conducted by the Ponemon Institute on behalf of Entrust, a provider of..

The post Survey Sees Little Post-Quantum Computing Encryption Progress appeared first on Security Boulevard.

Versa SASE Platform Now Prevents Sensitive Data From Being Shared With AI

10 February 2026 at 09:00

Versa has enhanced its SASE platform by integrating text analysis and optical character recognition (OCR) capabilities to better identify sensitive data and improve cybersecurity. The updates aim to provide deeper insights for teams dealing with AI-related data risks, reduce false positives, and enable effective incident response through AI-driven alert correlation.

The post Versa SASE Platform Now Prevents Sensitive Data From Being Shared With AI appeared first on Security Boulevard.

Zscaler Bolsters Zero-Trust Arsenal with Acquisition of Browser Security Firm SquareX

9 February 2026 at 14:18

Cloud security titan Zscaler Inc. has acquired SquareX, a pioneer in browser-based threat protection, in an apparent move to step away from traditional, clunky security hardware and toward a seamless, browser-native defense. The acquisition, which did not include financial terms, integrates SquareX’s browser detection and response technology into Zscaler’s Zero Trust Exchange platform. Unlike traditional..

The post Zscaler Bolsters Zero-Trust Arsenal with Acquisition of Browser Security Firm SquareX appeared first on Security Boulevard.

AI Revolution Reshapes CISO Spending for 2026: Security Leaders Prioritize Defense Automation

9 February 2026 at 12:22
CISOs Pump Up Political Prowess

The cybersecurity landscape is undergoing a fundamental shift as chief information security officers (CISOs) shift their 2026 budgets to artificial intelligence (AI) and realign traditional defense strategies. Nearly 80% of senior security executives are prioritizing AI-driven solutions to counter increasingly sophisticated threats, a new report from Glilot Capital Partners reveals. The survey, which polled leaders..

The post AI Revolution Reshapes CISO Spending for 2026: Security Leaders Prioritize Defense Automation appeared first on Security Boulevard.

Microsoft Unveils LiteBox, a Rust-Based Approach to Secure Sandboxing

6 February 2026 at 11:27
SlashNext vm2 sandbox bucket travel

Microsoft has released LiteBox, an experimental open-source library OS designed to sandbox applications while reducing their exposure to host systems. Written in Rust and published under the MIT license, LiteBox reflects the company’s efforts to upgrade software security as confidential computing gains adoption. LiteBox takes a different path from traditional virtualization or container technologies. Rather..

The post Microsoft Unveils LiteBox, a Rust-Based Approach to Secure Sandboxing appeared first on Security Boulevard.

Fraud Prevention Is a Latency Game

6 February 2026 at 10:44

There is a time window for every act of online fraud. When a transaction occurs, a fraud system must review it and decide if it’s legitimate before the payment clears or if the account could be compromised. That window happens in a blink, often one-tenth of a second or less. During that time, models must..

The post Fraud Prevention Is a Latency Game appeared first on Security Boulevard.

The Other Offense and Defense

6 February 2026 at 02:00
super bowl, offense, defense,

Alan discovers how the Super Bowl acts as a live-fire exercise in cybersecurity, requiring seamless coordination to manage massive attack surfaces and ensure integrity and trust in real time.

The post The Other Offense and Defense appeared first on Security Boulevard.

Orchid Security Adds Ability to Audit Behaviors by Identity

5 February 2026 at 11:30

Orchid Security today added an ability to conduct audits to its platform that enables cybersecurity teams to track behaviors of specific identities. Company CEO Roy Katmor said Identity Audit is designed to make it possible to unify proprietary audit data captured from unmanaged applications with audit logs data collected from third-party identity and access management..

The post Orchid Security Adds Ability to Audit Behaviors by Identity appeared first on Security Boulevard.

Operant AI’s Agent Protector Aims to Secure Rising Tide of Autonomous AI

5 February 2026 at 09:00

As the enterprise world shifts from chatbots to autonomous systems, Operant AI on Thursday launched Agent Protector, a real-time security solution designed to govern and shield artificial intelligence (AI) agents. The launch comes at a critical inflection point for corporate technology. Gartner predicts that by the end of 2026, 40% of enterprise applications will feature..

The post Operant AI’s Agent Protector Aims to Secure Rising Tide of Autonomous AI appeared first on Security Boulevard.

Asset Intelligence as Context Engineering for Cybersecurity Operations

5 February 2026 at 06:17
Chief Enterprise Intelligence Officer

Action depends on truth. Truth is hard to come by. There’s an old trope: “You can’t protect what you can’t see.” This burning need for total visibility has led to an abundance of security data across every domain. But abundance doesn’t equal clarity. One tool says a device is patched, another says it’s vulnerable. HR..

The post Asset Intelligence as Context Engineering for Cybersecurity Operations appeared first on Security Boulevard.

IT Gives, Security Takes Away, and Configuration Drift Is the Hidden Cost

4 February 2026 at 16:28

There’s an old joke in enterprise tech: IT giveth, and security taketh away. At its best, IT exists to empower people – to give employees faster, better, smarter tools to do their jobs. As we know no good deed goes unpunished, though, and security inevitably shows up afterward to clean up the risk created by..

The post IT Gives, Security Takes Away, and Configuration Drift Is the Hidden Cost appeared first on Security Boulevard.

The ‘Absolute Nightmare’ in Your DMs: OpenClaw Marries Extreme Utility with ‘Unacceptable’ Risk

4 February 2026 at 14:30
AI, risk, IT/OT, security, catastrophic, cyber risk, catastrophe, AI risk managed detection and response

It is the artificial intelligence (AI) assistant that users love and security experts fear. OpenClaw, the agentic AI platform created by Peter Steinberger, is tearing through the tech world, promising a level of automation that legacy chatbots like ChatGPT can’t match. But as cloud giants rush to host it, industry analysts are issuing a blunt..

The post The ‘Absolute Nightmare’ in Your DMs: OpenClaw Marries Extreme Utility with ‘Unacceptable’ Risk appeared first on Security Boulevard.

Beyond the Chatbot: Why NIST is Rewriting the Rules for Autonomous AI

4 February 2026 at 09:31

The chatbot era has ended. For two years, we’ve interacted with digital assistants that summarize emails and suggest recipes, but the National Institute of Standards and Technology (NIST) now draws a definitive line between machines that talk and machines that act. Their newly released Request for Information (RFI) signals a fundamental paradigm shift in how..

The post Beyond the Chatbot: Why NIST is Rewriting the Rules for Autonomous AI appeared first on Security Boulevard.

Navigating the AI Revolution in Cybersecurity: Risks, Rewards, and Evolving Roles

4 February 2026 at 02:41
cybersecurity, digital twin,

In the rapidly changing landscape of cybersecurity, AI agents present both opportunities and challenges. This article examines the findings from Darktrace’s 2026 State of AI Cybersecurity Report, highlighting the benefits of AI in enhancing security measures while addressing concerns regarding AI-driven threats and the need for responsible governance.

The post Navigating the AI Revolution in Cybersecurity: Risks, Rewards, and Evolving Roles appeared first on Security Boulevard.

The ‘Invisible Risk’: 1.5 Million Unmonitored AI Agents Threaten Corporate Security

3 February 2026 at 12:40
certificate water vulnerabilites Cybersecurity Doubters C-Suite

A massive “invisible workforce” of autonomous digital workers has arrived in the corporate world, but new research suggests it may be operating largely out of control. Large enterprises across the U.S. and UK have already deployed 3 million AI agents, according to a study released by Gravitee, an open-source leader in API and agentic management...

The post The ‘Invisible Risk’: 1.5 Million Unmonitored AI Agents Threaten Corporate Security appeared first on Security Boulevard.

Self-Healing AI for Security as Code: A Deep Dive Into Autonomy and Reliability 

3 February 2026 at 03:32
GenAI, multimodal ai, AI agents, CISO, AI, Malware, DataKrypto, Tumeryk,

Explore the transformative role of self-healing AI in cybersecurity. This article delves into its integration within DevSecOps, the balance between AI autonomy and human oversight, industry applications, and the challenges of implementation in protecting complex digital environments.

The post Self-Healing AI for Security as Code: A Deep Dive Into Autonomy and Reliability  appeared first on Security Boulevard.

Reorient Your Thinking to Tackle AI Security Risks

2 February 2026 at 14:54

The rise of artificial intelligence has rendered portions of your current cybersecurity playbook obsolete. Unless Chief Information Security Officers (CISOs) act quickly to reorient their thinking, they may be unaware of and unprepared to face emerging AI-related threats. Learn how to secure your organization’s AI usage and ensure implementation won’t have negative consequences. The Serious..

The post Reorient Your Thinking to Tackle AI Security Risks appeared first on Security Boulevard.

ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data

2 February 2026 at 11:39
credentials EUAC CUI classified secrets SMB

Several threat clusters are using vishing in extortion campaigns that include tactics that are consistent with those used by high-profile threat group ShinyHunters. They are stealing SSO and MFA credentials to access companies' environments and steal data from cloud applications, according to Mandiant researchers.

The post ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data appeared first on Security Boulevard.

BreachForums Breach Exposes Names of 324K Cybercriminals, Upends the Threat Intel Game

2 February 2026 at 04:30

The BreachForums marketplace has suffered a leak, exposing the identities of nearly 324,000 cybercriminals. This incident highlights a critical shift in cyberattacks, creating opportunities for law enforcement while demonstrating the risks associated with breaches in the cybercriminal ecosystem.

The post BreachForums Breach Exposes Names of 324K Cybercriminals, Upends the Threat Intel Game appeared first on Security Boulevard.

StrongestLayer: Top ‘Trusted’ Platforms are Key Attack Surfaces

2 February 2026 at 02:00

Explore StrongestLayer's threat intelligence report highlighting the rise of email security threats exploiting trusted platforms like DocuSign and Google Calendar. Learn how organizations can adapt to defend against these evolving cyber risks.

The post StrongestLayer: Top ‘Trusted’ Platforms are Key Attack Surfaces appeared first on Security Boulevard.

Report: Open Source Malware Instances Increased 73% in 2025

29 January 2026 at 15:50

ReversingLabs this week published a report that finds there was a 73% increase in the number of malicious open source packages discovered in 2025 compared with the previous year. More than 10,000 malicious open source packages were discovered, most of which involved node package managers (npms) that cybercriminals were using to compromise software supply chains...

The post Report: Open Source Malware Instances Increased 73% in 2025 appeared first on Security Boulevard.

MIND Extends DLP Reach to AI Agents

29 January 2026 at 08:57

MIND extends its data loss prevention platform to secure agentic AI, enabling organizations to discover, monitor, and govern AI agents in real time to prevent sensitive data exposure, shadow AI risks, and prompt injection attacks.

The post MIND Extends DLP Reach to AI Agents appeared first on Security Boulevard.

Radware Acquires Pynt to Add API Security Testing Tool

28 January 2026 at 15:53

Radware this week revealed it has acquired Pynt, a provider of a set of tools for testing the security of application programming interfaces (APIs). Uri Dorot, a senior product marketing manager for Radware, said that capability will continue to be made available as a standalone tool in addition to being more tightly integrated into the..

The post Radware Acquires Pynt to Add API Security Testing Tool appeared first on Security Boulevard.

Survey Surfaces Lots of Room for DevSecOps Improvement

28 January 2026 at 14:56
red team SEC data security privacy How to Bring DevOps and Security Teams Closer Together

A survey of 506 cybersecurity leaders and practitioners working for organizations with more than 500 employees, published today, finds that while 80% report security and DevOps teams are using shared observability tools, less than half (45%) say the two teams are very aligned on tooling and workflows compared to 43% that said these teams are..

The post Survey Surfaces Lots of Room for DevSecOps Improvement appeared first on Security Boulevard.

❌