Cloud Security
Are scalable cloud-native security solutions the future
How Can Non-Human Identities Revolutionize Cloud Security? The question of how to effectively manage Non-Human Identities (NHIs) is gaining urgency where industries harness scalable, cloud-native security solutions. These NHIs, crucial to cyber, ...
SPIFFE vs. OAuth: Access Control for Nonhuman Identities
5 min readSPIFFE focuses on who a workload is. It issues cryptographic identities to services and workloads so they can prove their authenticity to each other without relying on stored secrets. OAuth ...
Iranian Hackers Attack U.S. Company Stryker in Escalation of Cyber War
Jeffrey Burt | | CloudSEK, Cyberwar, Flashpoint, Hacktivists, Handala, Iran-Israel Conflict, nation-state actors, Stryker, Telegram, United States, wiper attack
Iranian nation-state group Handala claims it attacked U.S. medical tech giant Stryker, erasing the data from 200,000 corporate servers and mobile devices and stealing 50 TB of data in retaliation for a ...
Security Boulevard
Are DevOps teams supported by automated configurations
How Can DevOps Teams Enhance Security with Automated Configurations? What are some of the biggest security challenges facing DevOps teams? When organizations shift towards cloud-native environments, the role of machine identities, particularly ...
BlackSanta Malware Shuts Down Protections, Targets HR and Recruiting Operations
Jeffrey Burt | | Antivirus software, Aryaka, BadSanta, BYOVD attack, data exfiltration, EDR, human resources, KnowBe4, Lab 1, recruiters, Russian hackers, spear-phishing campaign
Russian threat actors for more than a year have targeted HR and recruiting operations in a sophisticated phishing and infostealing campaign that includes a component, dubbed BlackSanta, that can shut down antivirus ...
Security Boulevard
How does NHI management deliver value to businesses
Are Enterprises Overlooking the Risk Posed by Non-Human Identities? When organizations increasingly migrate their operations to the cloud, a critical element often slips under the radar: Non-Human Identities (NHIs). Despite their importance, ...
Can AI-driven cloud security fully protect data
How Can Non-Human Identities Transform AI-Driven Cloud Security? Have you ever pondered the pivotal role machine identities, or Non-Human Identities (NHIs), play in enhancing AI-driven cloud security and data protection? With technology ...
Phishing Scammers Impersonating City, County Officials, Demanding Payment: FBI
Jeffrey Burt | | AI phishing, American Planning Association, crypto currency, FBI, generative AI fraud, Hoxhunt, Municipalities
Scammers are impersonating local municipal officials around the country with seemingly legitimate phishing messages demanding payment for permits. The bad actors grab publicly available information and use them in their emails to ...
Security Boulevard
Are scalable secrets management systems more effective
Are Your Machine Identities Secure? Have you ever wondered about the invisible workforce within your systems? These are not your typical employees but rather Non-Human Identities (NHIs), commonly referred to as machine ...
Pro-Iranian Hacktivists Join Nation-State Groups in Targeting U.S., Israel, Others
Jeffrey Burt | | Anthropic AI, Carbon Black, Check Point, CloudSEK, critical infrastructure attacks, CyberAv3ngers, DoD (Department of Defense), Generative AI security risks, Hacktivists, ICS, Iran Hacker Groups, Iran-Israel Conflict, OpenAI, Symantec, United States
More than 60 hacktivist groups, armed with AI, mobilized within hours of the U.S. and Israel first striking Iran, adding another element to an already active and expanding cyberthreat environment that includes ...
Security Boulevard




