Vaguely magical and quadranty thing (Gemini) It’s not every day you get to reflect on a journey that started as an odd “googley” startup and culminates in a shiny Leaders placement on a Gartner Magic Quadrant for SIEM 2025 (MQ). When I…
Category: Security Boulevard
Sky-High Hack: How $600 Unlocked Global Secrets Streaming from Space
Right now, satellites are broadcasting your most private data in plaintext. A groundbreaking academic study just exposed a catastrophic security failure: using roughly $600 of consumer-grade equipment—the kind satellite TV hobbyists use—researchers built a listening station and intercepted signals across…
News Alert: Infineon debuts DEEPCRAFT™ AI Suite to power voice AI at the edge
Munich, Germany – Oct. 16, 2025 – Edge AI is reshaping the way we live, work, and interact in an increasingly connected world. To drive this transformation, Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) is expanding its Edge AI…
Bad sushi: China-nexus phishers shift to residential proxies
Earlier this year, Spamhaus researchers observed a major shift in phishing targeting Japan. Starting in April, a China-nexus threat actor began using residential proxy networks to send phishing emails instead of subnets at China Telecom and China Unicom. This blog…
NDSS 2025 – Workshop on Binary Analysis Research (BAR) 2025, Keynote II
Authors, Creators & Presenters: Dr. Heng Yin PhD, Professor, Department of Computer Science and Engineering, University of California, Riverside Workshop on Binary Analysis Research (BAR) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium 2025 Our thanks to…
Critical insights Q&A: AcceleTrex pilots a trust-first, privacy-led model to reinforce business outcomes
I’ve been writing about data trust and privacy engineering for more than a decade. Related: Preserving privacy can be profitable In 2015, I sat down with Cisco’s privacy lead, Michelle Dennedy, who argued that privacy must be grounded in ……
API Attack Awareness: When Authentication Fails — Exposing APIs to Risk
Authentication issues seem like low-level attacks. But authentication today – especially API authentication – can be more difficult than people expect. Companies rely on APIs to carry sensitive information every day. If access to those APIs is not properly secured,…
AI and the Golden Age of Surveillance
AI has ended the age of inefficient surveillance. Explore how automation, data, and machine learning are reshaping privacy, power, and the Fourth Amendment. The post AI and the Golden Age of Surveillance appeared first on Security Boulevard. This article has…
Designing Security for Developers, Not Around Them
GenAI boosts developer productivity—but also risk. Learn how developer-first security embeds data protection early, securing code and AI pipelines from the start. The post Designing Security for Developers, Not Around Them appeared first on Security Boulevard. This article has been…
Qualys ROCon: From SOC To Roc, Evolving To Agentic Risk Surface Management
Global sales SVP at Qualys Shawn O’Brien kicked off the company’s Qualys ROCon 2025 event this week in Houston, Texas. Driving straight into an opening keynote to explain what ROCon means today (remember that Qualys traditionally used the term Qualys…
NDSS 2025 – MADWeb 2025, Session 1: Network Meets The Web
Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium 2025 Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s…
Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales
Cybersecurity Awareness Month: How eCommerce Founders Can Build Trust and Security That Scales Introduction: Awareness Means Nothing Without Action October is Cybersecurity Awareness Month — but awareness alone doesn’t protect your store. Every Q4, eCommerce founders double down on sales,…
News Alert: MCPTotal unveils the first platform to secure Model Context Protocol workflows
NEW YORK, Oct. 15, 2025, CyberNewswire — MCPTotal, a comprehensive secure Model Context Protocol (MCP) platform, today announced its flagship platform to help businesses adopt and secure MCP servers. MCP has become the standard interface fxor connecting AI models ……
NDSS 2025 – MADWeb 2025, Opening Remarks and Keynote 1
Author, Creator & Presenter: Keynote 1 – Nick Nikiforakis, Stony Book University Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2025, co-located with the Network and Distributed System Security (NDSS) Symposium 2025 Our thanks to the Network and…
Randall Munroe’s XKCD ‘’Hiking”
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘’Hiking” appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Randall Munroe’s XKCD…
Patch Tuesday Update – October 2025
In total, including third-party CVEs, in this Patch Tuesday edition, Microsoft published 196 CVEs, including 21 republished CVEs. Overall, Microsoft announced 3 Zero-Day, 17 Critical, and 164 Important vulnerabilities. From an Impact perspective, Escalation of Privilege vulnerabilities accounted for 46%,…
MCPTotal Unfurls Hosting Service to Secure MCP Servers
MCPTotal today launched a hosting service to secure the Model Context Protocol (MCP) servers that are now starting to be more widely deployed to streamline data access for artificial intelligence (AI) applications and agents. Company CEO Gil Dabah said the…
Email Security and Compliance: What MSPs Need to Know in 2026
Earlier this year, we explored the widening gap between email security and compliance. It’s a gap that exists not because the threats are unclear or the risks misunderstood, but because the language of regulation still struggles to catch up with…
Boost AI Risk Management With AI Risk Quantification | Kovrr
Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Boost AI Risk Management With AI Risk Quantification | Kovrr appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…
Roll your own bot detection: server-side detection (part 2)
This is the second part of our series on building a lightweight, vendor-free anti-bot system to protect your login endpoint. In Part 1, we focused on the client side: we designed a fingerprinting script that collects various signals from the…