Friday, March 13, 2026

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
    • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

Secure Coding

Threat Modeling with AI: A Developer-Driven Boon for Enterprise Security 

Threat Modeling with AI: A Developer-Driven Boon for Enterprise Security 

Matias Madou | March 13, 2026 | AI tooling, AI-assisted threat modeling, AppSec collaboration, Attack Surface, Automation, continuous threat modeling, developer upskilling, developer-centric security, developers in security, governance, IDE integration, iot threats, LLMs in security, pattern recognition, proactive resilience, risk tooling, scalable defenses., Secure Coding, Security Culture, security proficiency, shift left, Supply Chain Risk, Threat Modeling, traceability, Vulnerability Remediation
For companies running a modern, adaptive and defense-centered security program, threat modeling is not a new concept. In fact, it’s one of the core tenets of preventative cybersecurity best practices. Being able ...
Security Boulevard
Power Secure Swift Development at Scale With Sonatype Nexus Repository

Power Secure Swift Development at Scale With Sonatype Nexus Repository

Aaron Linskens | February 11, 2026 | application development, dependencies, Nexus Repository, Package Managers, Secure Coding, secure software supply chain, Sonatype Nexus Repository
From its beginnings as a language for Apple platforms, Swift Package Manager has expanded its reach considerably. It now powers a wide range of mobile, desktop, and server-side applications, as well as ...
2024 Sonatype Blog
GenAI, multimodal ai, AI agents, CISO, AI, Malware, DataKrypto, Tumeryk,

Securing AI-Generated Code in Enterprise Applications: The New Frontier for AppSec Teams 

Bala Thripura Akasam | November 26, 2025 | AI code governance, AI Generated Code, AI security tools, AI vulnerabilities, AI-assisted development, Application Security, Business Logic Vulnerabilities, code provenance, DAST, developer training, DevSecOps, Fuzz Testing, LLM risks, logic flaws, runtime instrumentation, SAST, secure AI usage, Secure Coding, Secure SDLC, security copilots, shadow code, shift left, software assurance, think-wide
AI-generated code is reshaping software development and introducing new security risks. Organizations must strengthen governance, expand testing and train developers to ensure AI-assisted coding remains secure and compliant ...
Security Boulevard
The Shift Toward Unified Platforms in Application Security

The Shift Toward Unified Platforms in Application Security

Aaron Linskens | November 19, 2025 | Artificial Intelligence, Gartner, generative AI, Secure Coding, Software Security
Modern software delivery has never been more complex, or more interconnected ...
2024 Sonatype Blog
database, Real-time, data, data governance, concentric, ai, AWS, amazon, cloud, security, tools, Bedrock, data security, data breach, third parties, searchlight, data, AWS, Amazon, cloud security, just-in-time, security, Snyk, cloud, data, data lake, data, cloud storage, next-generation, cloud-native, cloud security, organizations, endpoint data Trend Micro

Designing Security for Developers, Not Around Them 

James Rice | October 16, 2025 | AI code vulnerabilities, AI coding tools, AI data governance, AI pipelines, AI Risk Management, AI Security, AI-powered development, ChatGPT security risks, cloud data security, Data Privacy, data protection, Data Tokenization, Developer Productivity, developer-first security, early-stage security, GenAI, James Rice, McKinsey AI study, Privacy By Design, Protegrity, Secure Coding, secure development lifecycle, secure software development, Software Security, synthetic data, Tokenization
GenAI boosts developer productivity—but also risk. Learn how developer-first security embeds data protection early, securing code and AI pipelines from the start ...
Security Boulevard
How AI and Vibe Coding Are Changing the Rules of Software Security

How AI and Vibe Coding Are Changing the Rules of Software Security

Aaron Linskens | October 7, 2025 | Artificial Intelligence, Gartner, generative AI, Secure Coding, Software Security
Software development is evolving at an unprecedented pace. Today's developers do far more than simply write lines of code ...
2024 Sonatype Blog
The Developer's Hippocratic Oath in the Age of AI

The Developer’s Hippocratic Oath in the Age of AI

Mitchell Johnson | September 4, 2025 | Artificial Intelligence, code quality, developers, generative AI, Secure Coding, Software Development, Thought Leaders
The best software developers I've had the privilege to work with live by the principle that they have ultimate responsibility for the code we introduce. They take ownership of what they write, ...
2024 Sonatype Blog
The Laws of Software Haven't Changed. We're Just Choosing to Forget Them

The Laws of Software Haven’t Changed. We’re Just Choosing to Forget Them

Brian Fox | August 14, 2025 | Artificial Intelligence, generative AI, governance, Secure Coding, secure software supply chain
We're in the middle of something that feels like a renaissance — a golden age of software creation that's less about syntax and more about prompting. At Black Hat 2025 last week, ...
2024 Sonatype Blog
Secure mobile applications with Dart, Flutter, and Sonatype

Secure mobile applications with Dart, Flutter, and Sonatype

Aaron Linskens | June 10, 2025 | Application Security, dependencies, mobile application, open source risk, Secure Coding
The Dart coding language and the Flutter framework architecture are gaining traction among developers looking to build fast, reliable, cross-platform applications ...
2024 Sonatype Blog
Tanya Janca on Secure Coding, AI in Security, and Her New Book!

Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book

Tom Eston | December 9, 2024 | Application Security, AppSec, Cyber Security, cyber threat, Cybersecurity, Data Privacy, developers, Development, DevSecOps, Digital Privacy, Episodes, Information Security, Infosec, owasp, Podcast, Podcasts, Privacy, sdlc, secure code, Secure Coding, security, She Hacks Purple, Tanya Janca, technology, Weekly Edition
Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in ...
Shared Security Podcast
Load more Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

Upcoming Webinars

The New Reality of Open Source Risk: 2026 OSSRA Findings
Why Traditional Security Fails the FinServ Speed Test
Next-Gen DSPM for the AI-Driven Enterprise
Run and Scale Agentic AI Applications in Production
Closing the Cloud Security Gap With Runtime Protection

Podcast

Listen to all of our podcasts

Secure by Design

1 day ago | Jack Poller

83% of Cloud Breaches Start with Identity, AI Agents Are About to Make it Worse

1 day ago | Jack Poller

The White House Got the Cyber Strategy Right — By Knowing What Not to Do

4 days ago | Jack Poller

Meta’s AI Safety Chief Couldn’t Stop Her Own Agent. What Makes You Think You Can Stop Yours?

3 weeks ago | Jack Poller

Anthropic Didn’t Kill Cybersecurity. It Just Reminded Us There Are Two Doors

3 weeks ago | Jack Poller

The Chicken Littles of Silicon Valley: Why AI Doomsayers Are Repeating History’s Greatest Mistake

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

Most Read on the Boulevard

OpenAI Acquires Security Startup Promptfoo to Fortify AI Agents
Meta’s AI Safety Chief Couldn’t Stop Her Own Agent. What Makes You Think You Can Stop Yours?
Pro-Iranian Hacktivists Join Nation-State Groups in Targeting U.S., Israel, Others
Report Surfaces Higher Correlation Between API and AI Security
Phishing Scammers Impersonating City, County Officials, Demanding Payment: FBI
Granular Policy Enforcement in Quantum Secure Discovery Services
​​How Chinese Hackers Reached America’s Surveillance Infrastructure
Beyond Prompt Injection: The Hidden AI Security Threats in Machine Learning Platforms
Microsoft’s March 2026 Patch Tuesday Addresses 83 CVEs (CVE-2026-21262, CVE-2026-26127)
What is the Salesforce GraphQL Exploit and What You Should Do

Industry Spotlight

The Lock, Not the Alarm: How Palo Alto’s Koi Acquisition Rewrites Endpoint Security
Featured Industry Spotlight Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Uncategorized 

The Lock, Not the Alarm: How Palo Alto’s Koi Acquisition Rewrites Endpoint Security

February 18, 2026 Jack Poller | Feb 18 0
Use of XMRig Cryptominer by Threat Actors Expanding: Expel
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Malware Mobile Security Network Security Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Use of XMRig Cryptominer by Threat Actors Expanding: Expel

January 9, 2026 Jeffrey Burt | Jan 09 Comments Off on Use of XMRig Cryptominer by Threat Actors Expanding: Expel
Malware Campaign Abuses Booking.com Against Hospitality Sector
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Malware Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight 

Malware Campaign Abuses Booking.com Against Hospitality Sector

January 5, 2026 Jeffrey Burt | Jan 05 Comments Off on Malware Campaign Abuses Booking.com Against Hospitality Sector

Top Stories

83% of Cloud Breaches Start with Identity, AI Agents Are About to Make it Worse
Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

83% of Cloud Breaches Start with Identity, AI Agents Are About to Make it Worse

March 12, 2026 Jack Poller | Yesterday 0
The White House Got the Cyber Strategy Right — By Knowing What Not to Do
Cybersecurity Featured Governance, Risk & Compliance News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

The White House Got the Cyber Strategy Right — By Knowing What Not to Do

March 12, 2026 Jack Poller | Yesterday 0
Europe’s Sovereign Search Plan is Really a Security Strategy
Cybersecurity Featured News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Europe’s Sovereign Search Plan is Really a Security Strategy

March 12, 2026 Alan Shimel | Yesterday 0

Download Free eBook

[su_panel border="0px solid #ddd" radius="0" text_align="center" padding-top="0px" padding-bottom="0px"]
The State of Cloud Native Security 2020
[/su_panel]

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2026 Techstrong Group Inc. All rights reserved.
Image
×

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.
      Advertisement