Video Interviews
Why AI Is Making Attack Surface Management Mandatory
Amit Sheps, head of product marketing at CyCognito, discusses the growing challenges cybersecurity teams face as artificial intelligence accelerates the ...
AI Security: What Enterprises Are Getting Wrong
The CSA Alliance has released their annual report on AI and security. Alan, Anton Chuvakin and Hillary Baron discuss the ...
Analytics and Intelligence
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence
ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data
Incident Response

Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Incident Response Malware Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Vulnerabilities
Anthropic, Microsoft MCP Server Flaws Shine a Light on AI Security Risks
IoT & ICS Security

Is Facial Recognition Considered a Passkey?
Dec 28 | MojoAuth - Advanced Authentication & Identity Solutions
Comments Off on Is Facial Recognition Considered a Passkey?
Understanding the Difference Between Passkeys and Biometrics
Dec 23 | MojoAuth - Advanced Authentication & Identity Solutions
Comments Off on Understanding the Difference Between Passkeys and Biometrics
Are Your Mobile APIs The New Weak Link? What Zscaler Just Exposed
Dec 2 | George McGregor
Comments Off on Are Your Mobile APIs The New Weak Link? What Zscaler Just Exposed
Industry Spotlight

Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Malware Mobile Security Network Security Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
Use of XMRig Cryptominer by Threat Actors Expanding: Expel
Security researchers last year wrote about a surge in the use by threat actors of the legitimate XMRig cryptominer, and cybersecurity firm Expel is now outlining the widening number of malicious ways they’re deploying the open-source tool against corporate IT operations.

Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Malware Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight
Malware Campaign Abuses Booking.com Against Hospitality Sector

Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
Google Chrome Extension is Intercepting Millions of Users’ AI Chats
Dec 17 | Jeffrey Burt
Comments Off on Google Chrome Extension is Intercepting Millions of Users’ AI Chats

Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches
Hackers Steal Personal Data in 700Credit Breach Affecting 5.6 Million
Dec 15 | Jeffrey Burt
Comments Off on Hackers Steal Personal Data in 700Credit Breach Affecting 5.6 Million

Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Malware Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
China Hackers Using Brickstorm Backdoor to Target Government, IT Entities
Dec 5 | Jeffrey Burt
Comments Off on China Hackers Using Brickstorm Backdoor to Target Government, IT Entities
Sponsored Content

Reorient Your Thinking to Tackle AI Security Risks
The rise of artificial intelligence has rendered portions of your current cybersecurity playbook obsolete. Unless Chief Information Security Officers (CISOs) act quickly to reorient their thinking, they may be unaware of and unprepared to face emerging AI-related threats. Learn how to secure your organization’s AI usage and ensure implementation won’t have negative consequences. The Serious..

AI-Powered Security Operations: Governance Considerations for Microsoft Sentinel Enterprise Deployments
Dec 9 | Marian Newsome
Comments Off on AI-Powered Security Operations: Governance Considerations for Microsoft Sentinel Enterprise Deployments

Microsoft Takes Aim at “Swivel-Chair Security” with Defender Portal Overhaul
Dec 9 | Jack Poller
Comments Off on Microsoft Takes Aim at “Swivel-Chair Security” with Defender Portal Overhaul
Click here for Industry spotlight inclusion guidelines
The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content. While there are vendor blogs in the Security Bloggers Network, original content from these vendors are featured here. The articles here must meet several criteria to be published:
- * Must be original when published
- * Must be vendor neutral
- * Must be transparent as to authorship
- * Must be of value to the community













