Video Interviews
Fighting Deep Fakes: Think Like the Attacker
Deepfakes have moved from novelty to a practical weapon — and Brian Long, CEO of Adaptive Security, says most organizations ...
Why AI Changes the Risk Model for Application Security
As AI becomes embedded in everyday development workflows, the security model for applications is shifting fast — and not always ...
Analytics and Intelligence
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Malware Mobile Security Network Security Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
Use of XMRig Cryptominer by Threat Actors Expanding: Expel
Incident Response
Analytics & Intelligence Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Incident Response Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches
Widely Used Malicious Extensions Steal ChatGPT, DeepSeek Conversations
Analytics & Intelligence Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Incident Response Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities
Threat Actors Exploiting Critical ‘MongoBleed’ MongoDB Flaw
IoT & ICS Security
Are Your Mobile APIs The New Weak Link? What Zscaler Just Exposed
Dec 2 | George McGregor
Comments Off on Are Your Mobile APIs The New Weak Link? What Zscaler Just Exposed
Industry Spotlight

Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Malware Mobile Security Network Security Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
Use of XMRig Cryptominer by Threat Actors Expanding: Expel
Security researchers last year wrote about a surge in the use by threat actors of the legitimate XMRig cryptominer, and cybersecurity firm Expel is now outlining the widening number of malicious ways they’re deploying the open-source tool against corporate IT operations.

Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Malware Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight
Malware Campaign Abuses Booking.com Against Hospitality Sector

Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
Google Chrome Extension is Intercepting Millions of Users’ AI Chats

Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches
Hackers Steal Personal Data in 700Credit Breach Affecting 5.6 Million

Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Malware Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
China Hackers Using Brickstorm Backdoor to Target Government, IT Entities
Dec 5 | Jeffrey Burt
Comments Off on China Hackers Using Brickstorm Backdoor to Target Government, IT Entities
Sponsored Content

Zero-Trust Isn’t Optional Anymore—It’s Your AI Agent Fire Drill
Here is the ugly truth about security incidents today. The bad guys don’t storm the castle breaking down the walls. Most attacks start with a login that was obtained. Once inside they see where they can go and what they can do. They enter the front door with working keys. And now, because the universe..

AI-Powered Security Operations: Governance Considerations for Microsoft Sentinel Enterprise Deployments
Dec 9 | Marian Newsome
Comments Off on AI-Powered Security Operations: Governance Considerations for Microsoft Sentinel Enterprise Deployments

Microsoft Takes Aim at “Swivel-Chair Security” with Defender Portal Overhaul
Dec 9 | Jack Poller
Comments Off on Microsoft Takes Aim at “Swivel-Chair Security” with Defender Portal Overhaul

The Attack Surface of Cloud-Based Generative AI Applications is Evolving
Nov 26 | Alastair Cooke
Comments Off on The Attack Surface of Cloud-Based Generative AI Applications is Evolving
Click here for Industry spotlight inclusion guidelines
The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content. While there are vendor blogs in the Security Bloggers Network, original content from these vendors are featured here. The articles here must meet several criteria to be published:
- * Must be original when published
- * Must be vendor neutral
- * Must be transparent as to authorship
- * Must be of value to the community














