Normal view

Received before yesterday

Rethinking Security as Access Control Moves to the Edge

11 December 2025 at 13:35
attacks, cyberattacks, cybersecurity, lobin, CISOs, encryption, organizations, recovery, Fenix24, Edgeless digital immunity, digital security, confidential Oracle recovery gateway, security

The convergence of physical and digital security is driving a shift toward software-driven, open-architecture edge computing. Access control has typically been treated as a physical domain problem — managing who can open which doors, using specialized systems largely isolated from broader enterprise IT. However, the boundary between physical and digital security is increasingly blurring. With..

The post Rethinking Security as Access Control Moves to the Edge appeared first on Security Boulevard.

Hacks Up, Budgets Down: OT Oversight Must Be An IT Priority

11 December 2025 at 13:32

OT oversight is an expensive industrial paradox. It’s hard to believe that an area can be simultaneously underappreciated, underfunded, and under increasing attack. And yet, with ransomware hackers knowing that downtime equals disaster and companies not monitoring in kind, this is an open and glaring hole across many ecosystems. Even a glance at the numbers..

The post Hacks Up, Budgets Down: OT Oversight Must Be An IT Priority appeared first on Security Boulevard.

Identity Management in the Fragmented Digital Ecosystem: Challenges and Frameworks

11 December 2025 at 13:27

Modern internet users navigate an increasingly fragmented digital ecosystem dominated by countless applications, services, brands and platforms. Engaging with online offerings often requires selecting and remembering passwords or taking other steps to verify and protect one’s identity. However, following best practices has become incredibly challenging due to various factors. Identifying Digital Identity Management Problems in..

The post Identity Management in the Fragmented Digital Ecosystem: Challenges and Frameworks appeared first on Security Boulevard.

Rebrand Cybersecurity from “Dr. No” to “Let’s Go”

9 December 2025 at 11:52
CISOs, challenge, security strategy

When it comes to cybersecurity, it often seems the best prevention is to follow a litany of security “do’s” and “don’ts.”  A former colleague once recalled that at one organization where he worked, this approach led to such a long list of guidance that the cybersecurity function was playfully referred to as a famous James..

The post Rebrand Cybersecurity from “Dr. No” to “Let’s Go” appeared first on Security Boulevard.

AI-Powered Security Operations: Governance Considerations for Microsoft Sentinel Enterprise Deployments

9 December 2025 at 11:31
agentic aiDeepseek, CrowdStrike, agentic,

The Tech Field Day Exclusive with Microsoft Security (#TFDxMSSec25) spotlighted one of the most aggressive demonstrations of AI-powered security operations to date. Microsoft showcased how Sentinel’s evolving data lake and graph architecture now drive real-time, machine-assisted threat response. The demo of “Attack Disruption” captured the promise—and the unease—of a security operations center where AI acts..

The post AI-Powered Security Operations: Governance Considerations for Microsoft Sentinel Enterprise Deployments appeared first on Security Boulevard.

Microsoft Takes Aim at “Swivel-Chair Security” with Defender Portal Overhaul

9 December 2025 at 10:20

At a recent Tech Field Day Exclusive event, Microsoft unveiled a significant evolution of its security operations strategy—one that attempts to solve a problem plaguing security teams everywhere: the exhausting practice of jumping between multiple consoles just to understand a single attack. The Problem: Too Many Windows, Not Enough Clarity Security analysts have a name..

The post Microsoft Takes Aim at “Swivel-Chair Security” with Defender Portal Overhaul appeared first on Security Boulevard.

Cultural Lag Leaves Security as the Weakest Link

5 December 2025 at 11:19
cybersecurity

For too long, security has been cast as a bottleneck – swooping in after developers build and engineers test to slow things down. The reality is blunt; if it’s bolted on, you’ve already lost. The ones that win make security part of every decision, from the first line of code to the last boardroom conversation...

The post Cultural Lag Leaves Security as the Weakest Link appeared first on Security Boulevard.

Closing the Document Security Gap: Why Document Workflows Must Be Part of Cybersecurity

2 December 2025 at 12:35
security, risk, vector

Organizations are spending more than ever on cybersecurity, layering defenses around networks, endpoints, and applications. Yet a company’s documents, one of the most fundamental business assets, remains an overlooked weak spot. Documents flow across every department, cross company boundaries, and often contain the very data that compliance officers and security teams work hardest to protect...

The post Closing the Document Security Gap: Why Document Workflows Must Be Part of Cybersecurity appeared first on Security Boulevard.

How Financial Institutions Can Future-Proof Their Security Against a New Breed of Cyber Attackers

2 December 2025 at 12:34

As we look at the remainder of 2025 and beyond, the pace and sophistication of cyber attacks targeting the financial sector show no signs of slowing. In fact, based on research from Check Point’s Q2 Ransomware Report, the financial cybersecurity threat landscape is only intensifying. Gone are the days when the average hacker was a..

The post How Financial Institutions Can Future-Proof Their Security Against a New Breed of Cyber Attackers appeared first on Security Boulevard.

The Trust Crisis: Why Digital Services Are Losing Consumer Confidence

26 November 2025 at 12:45
TrustCloud third party risk Insider threat Security Digital Transformation

According to the Thales Consumer Digital Trust Index 2025, global confidence in digital services is slipping fast. After surveying more than 14,000 consumers across 15 countries, the findings are clear: no sector earned high trust ratings from even half its users. Most industries are seeing trust erode — or, at best, stagnate. In an era..

The post The Trust Crisis: Why Digital Services Are Losing Consumer Confidence appeared first on Security Boulevard.

How to Protect from Online Fraud This Holiday Season

26 November 2025 at 12:00

Peak e-commerce season hits retailers every year just as the Halloween decorations start to come down. Unsurprisingly, cyber criminals see this time as an opportunity to strike, and criminal activity online spikes alongside sales. Shockingly, 4.6% of attempted e-commerce transactions during the 2024 Black Friday period were suspected to be digital fraud. In the UK..

The post How to Protect from Online Fraud This Holiday Season appeared first on Security Boulevard.

The Attack Surface of Cloud-Based Generative AI Applications is Evolving

26 November 2025 at 09:33

It is the right time to talk about this. Cloud-based Artificial Intelligence, or specifically those big, powerful Large Language Models we see everywhere, they’ve completely changed the game. They’re more than just a new application tier. They’re an entirely new attack surface. You’ve moved your critical applications to the public cloud. You did it for..

The post The Attack Surface of Cloud-Based Generative AI Applications is Evolving appeared first on Security Boulevard.

Don’t Use a Ruler to Measure Wind Speed: Establishing a Standard for Competitive Solutions Testing

25 November 2025 at 10:35

Competitive testing is a business-critical function for financial institutions seeking the ideal solutions provider to help optimize their risk management strategies. Don’t get seduced by inflated test results or flowery marketing claims, however. Selecting the right risk solutions could be one of the most important tasks your business ever undertakes – and one of the..

The post Don’t Use a Ruler to Measure Wind Speed: Establishing a Standard for Competitive Solutions Testing appeared first on Security Boulevard.

The Emergence of GPT-4-Powered Ransomware and the Threat to IAM Systems

25 November 2025 at 10:03

The cybersecurity landscape is undergoing a profound transformation. Traditional malware, characterized by static code and predictable behaviors, is being eclipsed by a new breed of threats powered by advanced artificial intelligence. A notable example is the emergence of MalTerminal, a malware leveraging OpenAI’s GPT-4 to generate ransomware and reverse shells in real-time. This development marks..

The post The Emergence of GPT-4-Powered Ransomware and the Threat to IAM Systems appeared first on Security Boulevard.

The Data Privacy Risk Lurking in Paperless Government

18 November 2025 at 10:57

The world is becoming increasingly paperless, and most organizations, including federal agencies, are following suit. Switching from paper-based processes to digital ones offers great benefits. However, the security and compliance challenges that come with this shift aren’t to be taken lightly. As the federal government goes paperless to cut costs and modernize operational processes, a..

The post The Data Privacy Risk Lurking in Paperless Government appeared first on Security Boulevard.

The Trojan Prompt: How GenAI is Turning Staff into Unwitting Insider Threats

14 November 2025 at 13:40
multimodal ai, AI agents, CISO, AI, Malware, DataKrypto, Tumeryk,

When a wooden horse was wheeled through the gates of Troy, it was welcomed as a gift but hid a dangerous threat. Today, organizations face the modern equivalent: the Trojan prompt. It might look like a harmless request: “summarize the attached financial report and point out any potential compliance issues.” Within seconds, a generative AI..

The post The Trojan Prompt: How GenAI is Turning Staff into Unwitting Insider Threats appeared first on Security Boulevard.

HPE’s Post-Juniper Vision: AI-Driven Security at Enterprise Scale

13 November 2025 at 13:09
BLAs, API attacks, verification, API, API fraud Cybereason CISOs Can Boost Their Credibility

The New HPE Networking: Integration Complete At Security Field Day, Hewlett Packard Enterprise showcased the results of its most ambitious integration effort: combining decades of networking expertise under a single, AI-driven security vision. The centerpiece is the completion of the Juniper Networks acquisition in early July, creating the newly formed HPE Networking organization. This follows..

The post HPE’s Post-Juniper Vision: AI-Driven Security at Enterprise Scale appeared first on Security Boulevard.

Navigating Fraud in Customer Verification and Real-Time Payments

13 November 2025 at 12:14

As technology continues to rapidly advance (i.e. generative AI, large language models, quantum computing, etc.), financial institutions (FIs) must evolve while balancing opportunity and risk. FIs are embracing advanced technology to meet rising customer expectations for frictionless digital experiences and streamlined customer support. However, these advancements also introduce new vulnerabilities, especially when it comes to..

The post Navigating Fraud in Customer Verification and Real-Time Payments appeared first on Security Boulevard.

Nile’s Bold Claim: Your LAN Architecture Is Fundamentally Broken

12 November 2025 at 15:29

At Security Field Day, Nile delivered a message that challenges decades of enterprise networking orthodoxy: the traditional Local Area Network architecture is fundamentally obsolete for modern security requirements. The problem isn’t subtle. While connectivity remains the lifeblood of most organizations, traditional LAN environments—where the majority of users and devices operate—receive the least investment and are..

The post Nile’s Bold Claim: Your LAN Architecture Is Fundamentally Broken appeared first on Security Boulevard.

How to Build a Strong Ransomware Defense Strategy for Your Organization?

12 November 2025 at 09:33
ransomware, attacks, Rubrik, cybersecurity, Ransomware, attacks, payment, RaaS, ransomware, attack, healthcare

Ransomware attacks increased by 149% in 2025, within the U.S. alone. Organizations have paid millions in ransom and recovery costs, making ransomware attacks one of the most financially debilitating cyberattacks. To ensure that your organization can prevent or at least successfully mitigate the effects of ransomware attacks, you must prioritize the safety of people, processes..

The post How to Build a Strong Ransomware Defense Strategy for Your Organization? appeared first on Security Boulevard.

Fortinet’s Fabric-Based Approach to Cloud Security

7 November 2025 at 11:30

The enterprise migration to the cloud has created a security paradox. While digital transformation and multi-cloud architectures promise agility, they have also delivered unprecedented complexity. This complexity is the modern CISO’s greatest enemy. For every new cloud environment, SaaS application, or remote workforce, a new, siloed security tool has usually been procured. The result is..

The post Fortinet’s Fabric-Based Approach to Cloud Security appeared first on Security Boulevard.

Stop Paying the Password Tax: A CFO’s Guide to Affordable Zero-Trust Access

7 November 2025 at 11:08

In 2025, stolen credentials remain the most common and fastest path into an organization’s systems. Nearly half of breaches begin with compromised logins. The 2025 Verizon Data Breach Investigations Report puts it bluntly: “Hackers don’t break in anymore, they log in.” Web application attacks have followed suit, with 88% now using stolen credentials as the..

The post Stop Paying the Password Tax: A CFO’s Guide to Affordable Zero-Trust Access appeared first on Security Boulevard.

Securing the AI-Enabled Enterprise

7 November 2025 at 09:42

AI-Driven Security Threats: Moving Beyond the Hype Security does a great job of sensationalizing attacks. This trend was set from a perspective of awareness and edge cases which the industry deals with as attacks and realized perspectives. While this approach leads to discussions around AI-driven cybersecurity threats the risks are hard to comprehend but certain..

The post Securing the AI-Enabled Enterprise appeared first on Security Boulevard.

Beyond the Vault: 1Password’s Strategic Pivot to Extended Access Management

6 November 2025 at 15:33
attacks, cyberattacks, cybersecurity, lobin, CISOs, encryption, organizations, recovery, Fenix24, Edgeless digital immunity, digital security, confidential Oracle recovery gateway, security

The enterprise IT perimeter dissolved years ago, taking with it any illusion that security teams can dictate which applications employees use or which devices they work from. Today’s reality: employees install applications freely, work from anywhere, and routinely bypass VPN requirements to maintain productivity. At the recent Security Field Day, 1Password laid out its strategic..

The post Beyond the Vault: 1Password’s Strategic Pivot to Extended Access Management appeared first on Security Boulevard.

Rethinking Cyber Resilience in the Age of AI

5 November 2025 at 11:58

AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data anymore. It’s about double extortion, data theft, and the erosion of trust that organizations depend on to operate. As threat..

The post Rethinking Cyber Resilience in the Age of AI appeared first on Security Boulevard.

Securing Agentic AI: Extending Network Security Principles to Serverless Environments

4 November 2025 at 15:09
digital twin

As enterprise AI rapidly matures, we’re entering a new phase, one powered by agentic AI. These intelligent agents are more autonomous, capable of making decisions, taking actions, and adapting dynamically to new environments. This evolution introduces new complexity in how we build AI systems as well as in how we secure them. Agentic AI doesn’t..

The post Securing Agentic AI: Extending Network Security Principles to Serverless Environments appeared first on Security Boulevard.

Defense in Depth for AI: The MCP Security Architecture You’re Missing

3 November 2025 at 15:46

As AI agents become integral to cloud native applications, the Model Context Protocol (MCP) has emerged as a leading standard for enabling these agents to interact with external tools and data sources. But with this new architectural pattern comes a critical security challenge: MCP-based systems require protection at three distinct layers, not just one. The..

The post Defense in Depth for AI: The MCP Security Architecture You’re Missing appeared first on Security Boulevard.

How Ransomware Attacks Leverage Cyber Insurance Policies

3 November 2025 at 14:55

Ransomware attacks continue to evolve into sophisticated strategic and psychological operations. Threat actors are always seeking ways to maximize their illicit gains, and they’ve now discovered a powerful piece to leverage: a company’s cyber insurance policy. When attackers gain access to cyber policy details, they come to a ransomware negotiation already holding some of their..

The post How Ransomware Attacks Leverage Cyber Insurance Policies appeared first on Security Boulevard.

Bridging the Trust Gap with 1Password

3 November 2025 at 12:55

We have spent what seems like an eternity of our careers trying to wrangle access issues. We set up our shiny SSO portals, federate the big apps, and feel pretty good. We have a “bubble” of control. But that bubble popped. Reality is a chaotic mess of Software-as-a-Service (SaaS) sprawl, personal devices accessing corporate data,..

The post Bridging the Trust Gap with 1Password appeared first on Security Boulevard.

Defending DNS with Infoblox and Protective DNS

31 October 2025 at 15:47

For too long, we’ve treated DNS as a simple utility. It’s just a phonebook for the internet, right? Treating it that way is a mistake. Nearly every single malicious action, whether it’s a phishing link, a command-and-control (C2) callback, or data exfiltration, starts with a DNS query. It is integral to the attacker workflow. So,..

The post Defending DNS with Infoblox and Protective DNS appeared first on Security Boulevard.

Your Enterprise LAN Security Is a Problem—Nile Can Fix It

30 October 2025 at 12:52
BLAs, API attacks, verification, API, API fraud Cybereason CISOs Can Boost Their Credibility

For decades, the Local Area Network (LAN) has been the neglected, insecure backyard of the enterprise. While we’ve poured money and talent into fortifying our data centers and cloud environments, the LAN has remained a tangled mess of implicit trust, complicated IPAM spreadsheets, and security appliances bolted on like afterthoughts. It’s the place where “plug..

The post Your Enterprise LAN Security Is a Problem—Nile Can Fix It appeared first on Security Boulevard.

The Wild West of AI-Driven Fraud

30 October 2025 at 10:28
multimodal ai, AI agents, CISO, AI, Malware, DataKrypto, Tumeryk,

We are in the middle of an AI gold rush. The technology is advancing, democratizing access to everything from automated content creation to algorithmic decision-making. For businesses, this means opportunity. For fraudsters, it means carte blanche. Deepfakes, synthetic identities and automated scams are no longer fringe tactics. According to Deloitte, GenAI could drive fraud losses..

The post The Wild West of AI-Driven Fraud appeared first on Security Boulevard.

The CISO’s Guide to Model Context Protocol (MCP)

30 October 2025 at 10:26

As engineering teams race to adopt the Model Context Protocol (MCP) to harness the power of agentic AI, a more cautious conversation dominates security leaders’ mindshare. While the potential for innovation is clear, the primary question for CISOs and CIOs is more fundamental: how are we going to manage the growing risk?  The answer is..

The post The CISO’s Guide to Model Context Protocol (MCP) appeared first on Security Boulevard.

How HPE’s New Security Playbook Is Actually Stopping Threats

29 October 2025 at 13:00

For the past few years, the term “AI in cybersecurity” has been mostly marketing fluff. We’ve all sat through vendor presentations promising a magical AI black box that solves everything, only to find it’s just a fancier pattern matching engine. So, when HPE finalized its acquisition of Juniper Networks, there was cautious optimism that this..

The post How HPE’s New Security Playbook Is Actually Stopping Threats appeared first on Security Boulevard.

❌