Normal view

Received before yesterday

AI-Powered Security Operations: Governance Considerations for Microsoft Sentinel Enterprise Deployments

9 December 2025 at 11:31
agentic aiDeepseek, CrowdStrike, agentic,

The Tech Field Day Exclusive with Microsoft Security (#TFDxMSSec25) spotlighted one of the most aggressive demonstrations of AI-powered security operations to date. Microsoft showcased how Sentinel’s evolving data lake and graph architecture now drive real-time, machine-assisted threat response. The demo of “Attack Disruption” captured the promise—and the unease—of a security operations center where AI acts..

The post AI-Powered Security Operations: Governance Considerations for Microsoft Sentinel Enterprise Deployments appeared first on Security Boulevard.

Microsoft Takes Aim at “Swivel-Chair Security” with Defender Portal Overhaul

9 December 2025 at 10:20

At a recent Tech Field Day Exclusive event, Microsoft unveiled a significant evolution of its security operations strategy—one that attempts to solve a problem plaguing security teams everywhere: the exhausting practice of jumping between multiple consoles just to understand a single attack. The Problem: Too Many Windows, Not Enough Clarity Security analysts have a name..

The post Microsoft Takes Aim at “Swivel-Chair Security” with Defender Portal Overhaul appeared first on Security Boulevard.

The Attack Surface of Cloud-Based Generative AI Applications is Evolving

26 November 2025 at 09:33

It is the right time to talk about this. Cloud-based Artificial Intelligence, or specifically those big, powerful Large Language Models we see everywhere, they’ve completely changed the game. They’re more than just a new application tier. They’re an entirely new attack surface. You’ve moved your critical applications to the public cloud. You did it for..

The post The Attack Surface of Cloud-Based Generative AI Applications is Evolving appeared first on Security Boulevard.

HPE’s Post-Juniper Vision: AI-Driven Security at Enterprise Scale

13 November 2025 at 13:09
BLAs, API attacks, verification, API, API fraud Cybereason CISOs Can Boost Their Credibility

The New HPE Networking: Integration Complete At Security Field Day, Hewlett Packard Enterprise showcased the results of its most ambitious integration effort: combining decades of networking expertise under a single, AI-driven security vision. The centerpiece is the completion of the Juniper Networks acquisition in early July, creating the newly formed HPE Networking organization. This follows..

The post HPE’s Post-Juniper Vision: AI-Driven Security at Enterprise Scale appeared first on Security Boulevard.

Nile’s Bold Claim: Your LAN Architecture Is Fundamentally Broken

12 November 2025 at 15:29

At Security Field Day, Nile delivered a message that challenges decades of enterprise networking orthodoxy: the traditional Local Area Network architecture is fundamentally obsolete for modern security requirements. The problem isn’t subtle. While connectivity remains the lifeblood of most organizations, traditional LAN environments—where the majority of users and devices operate—receive the least investment and are..

The post Nile’s Bold Claim: Your LAN Architecture Is Fundamentally Broken appeared first on Security Boulevard.

Fortinet’s Fabric-Based Approach to Cloud Security

7 November 2025 at 11:30

The enterprise migration to the cloud has created a security paradox. While digital transformation and multi-cloud architectures promise agility, they have also delivered unprecedented complexity. This complexity is the modern CISO’s greatest enemy. For every new cloud environment, SaaS application, or remote workforce, a new, siloed security tool has usually been procured. The result is..

The post Fortinet’s Fabric-Based Approach to Cloud Security appeared first on Security Boulevard.

Beyond the Vault: 1Password’s Strategic Pivot to Extended Access Management

6 November 2025 at 15:33
attacks, cyberattacks, cybersecurity, lobin, CISOs, encryption, organizations, recovery, Fenix24, Edgeless digital immunity, digital security, confidential Oracle recovery gateway, security

The enterprise IT perimeter dissolved years ago, taking with it any illusion that security teams can dictate which applications employees use or which devices they work from. Today’s reality: employees install applications freely, work from anywhere, and routinely bypass VPN requirements to maintain productivity. At the recent Security Field Day, 1Password laid out its strategic..

The post Beyond the Vault: 1Password’s Strategic Pivot to Extended Access Management appeared first on Security Boulevard.

Rethinking Cyber Resilience in the Age of AI

5 November 2025 at 11:58

AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data anymore. It’s about double extortion, data theft, and the erosion of trust that organizations depend on to operate. As threat..

The post Rethinking Cyber Resilience in the Age of AI appeared first on Security Boulevard.

Bridging the Trust Gap with 1Password

3 November 2025 at 12:55

We have spent what seems like an eternity of our careers trying to wrangle access issues. We set up our shiny SSO portals, federate the big apps, and feel pretty good. We have a “bubble” of control. But that bubble popped. Reality is a chaotic mess of Software-as-a-Service (SaaS) sprawl, personal devices accessing corporate data,..

The post Bridging the Trust Gap with 1Password appeared first on Security Boulevard.

Defending DNS with Infoblox and Protective DNS

31 October 2025 at 15:47

For too long, we’ve treated DNS as a simple utility. It’s just a phonebook for the internet, right? Treating it that way is a mistake. Nearly every single malicious action, whether it’s a phishing link, a command-and-control (C2) callback, or data exfiltration, starts with a DNS query. It is integral to the attacker workflow. So,..

The post Defending DNS with Infoblox and Protective DNS appeared first on Security Boulevard.

Your Enterprise LAN Security Is a Problem—Nile Can Fix It

30 October 2025 at 12:52
BLAs, API attacks, verification, API, API fraud Cybereason CISOs Can Boost Their Credibility

For decades, the Local Area Network (LAN) has been the neglected, insecure backyard of the enterprise. While we’ve poured money and talent into fortifying our data centers and cloud environments, the LAN has remained a tangled mess of implicit trust, complicated IPAM spreadsheets, and security appliances bolted on like afterthoughts. It’s the place where “plug..

The post Your Enterprise LAN Security Is a Problem—Nile Can Fix It appeared first on Security Boulevard.

How HPE’s New Security Playbook Is Actually Stopping Threats

29 October 2025 at 13:00

For the past few years, the term “AI in cybersecurity” has been mostly marketing fluff. We’ve all sat through vendor presentations promising a magical AI black box that solves everything, only to find it’s just a fancier pattern matching engine. So, when HPE finalized its acquisition of Juniper Networks, there was cautious optimism that this..

The post How HPE’s New Security Playbook Is Actually Stopping Threats appeared first on Security Boulevard.

❌