Tag: guide
-
Ready to Move On: How to Evaluate, Select, and Deploy Modern Email Security
<div cla Part 4 of a 4-Part Series: The SEG Breakup Guide for MSPs First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/ready-to-move-on-how-to-evaluate-select-and-deploy-modern-email-security/
-
AI in the SOC: Why Complete Autonomy Is the Wrong Goal
Dan Petrillo, VP of Product at BlueVoyant As artificial intelligence (AI) becomes more deeply embedded in security operations, a divide has emerged in how its role is defined. Some argue the security operations centre (SOC) should be fully autonomous, with AI replacing human analysts. Others believe that augmentation is the right path, using AI to support and extend existing teams. Augmentation probably reflects…
-
AI in the SOC: Why Complete Autonomy Is the Wrong Goal
Dan Petrillo, VP of Product at BlueVoyant As artificial intelligence (AI) becomes more deeply embedded in security operations, a divide has emerged in how its role is defined. Some argue the security operations centre (SOC) should be fully autonomous, with AI replacing human analysts. Others believe that augmentation is the right path, using AI to support and extend existing teams. Augmentation probably reflects…
-
Your Most Dangerous User Is Not Human: How AI Agents and MCP Servers Broke the Internal API Walled Garden
Highlights The Perimeter is Porous: Modern Agentic AI and the Model Context Protocol (MCP) have effectively turned internal data centers inside out, making the “internal API” security model obsolete. The “Confused Deputy” Risk: Legitimate AI agents act as trusted internal entities but can be exploited to bypass Data Loss Prevention (DLP) policies, as seen in…
-
SRE Playbook: A Guide to Discover and Catalog Non-Human Identities (NHI)
Tags: guideLet’s take a closer look at the fragmented NHI inventory from a site reliability engineer’s perspective. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/sre-playbook-a-guide-to-discover-and-catalog-non-human-identities-nhi/
-
How to Securely Edit and Redact Sensitive PDFs: A Cybersecurity Guide
PDF security guide covering redaction, metadata risks, compliance standards, and safe editing of password-protected files to prevent data leaks. First seen on hackread.com Jump to article: hackread.com/securely-edit-redact-sensitive-pdfs-cybersecurity-guide/
-
Finding a common language around risk
Tags: ceo, cio, ciso, corporate, cyber, cybersecurity, defense, framework, governance, guide, intelligence, lessons-learned, metric, monitoring, phishing, ransomware, risk, risk-management, service, strategy, supply-chain, technology, threat, tool, training, updateBuilding one culture from three languages: The Organizational Risk Culture Standard (ORCS) offers something most frameworks miss: it treats culture as the foundation, not the afterthought. You can’t bolt culture onto existing processes and call it done. Culture is how people actually think about risk when no one is watching. It’s the shared beliefs that…
-
Google Ads and Claude AI Abused to Spread MacSync Malware via ClickFix
Cybersecurity experts at Moonlock Lab have discovered a new ClickFix attack. Hackers are using hijacked Google Ads and fake Claude AI guides to trick Mac users into installing the data-stealing MacSync malware. First seen on hackread.com Jump to article: hackread.com/google-ads-claude-ai-macsync-malware-clickfix/
-
The Relationship Tax: What Staying With Your SEG Is Really Costing Your MSP
<div cla Part 3 of a 4-Part Series: The SEG Breakup Guide for MSPs First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/the-relationship-tax-what-staying-with-your-seg-is-really-costing-your-msp/
-
AI Powered HIPAA Compliance Readiness Testing in Healthcare Software. A QA Leader’s Guide to Continuous Compliance
In healthcare software, quality is inseparable from compliance. A feature working as designed is not enough. Every workflow, integration, and data exchange must protect Protected…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2026/02/ai-powered-hipaa-compliance-readiness-testing-in-healthcare-software-a-qa-leaders-guide-to-continuous-compliance/
-
5 key trends reshaping the SIEM market
Tags: ai, api, attack, automation, business, cloud, compliance, crowdstrike, cyber, cybersecurity, data, detection, edr, google, guide, Hardware, ibm, identity, incident response, intelligence, jobs, monitoring, msp, network, nis-2, saas, service, siem, soar, startup, technology, threat, tool, vulnerability, vulnerability-managementMarket split as midrange sales offset SME slump: A year on, Context’s data shows that this ongoing convergence of SIEM with security tools such as XDR and SOAR has triggered a structural split in the market.”Large midmarket firms are doubling down on unified platforms for compliance, while smaller organizations are investing less in SIEM entirely…
-
Understanding WS-Trust: A Guide to Secure Token Exchange
Tags: guideDeep dive into WS-Trust for enterprise identity. Learn about STS, token exchange, and secure SSO integration for modern B2B platforms. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/understanding-ws-trust-a-guide-to-secure-token-exchange/
-
Understanding WS-Trust: A Guide to Secure Token Exchange
Tags: guideDeep dive into WS-Trust for enterprise identity. Learn about STS, token exchange, and secure SSO integration for modern B2B platforms. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/understanding-ws-trust-a-guide-to-secure-token-exchange/
-
Roses Are Red, AI Is Wild: A Guide to AI Regulation
AI regulation doesn’t have to be romanticized or feared. Understand what matters in AI governance, compliance, and SaaS risk management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/roses-are-red-ai-is-wild-a-guide-to-ai-regulation/
-
Roses Are Red, AI Is Wild: A Guide to AI Regulation
AI regulation doesn’t have to be romanticized or feared. Understand what matters in AI governance, compliance, and SaaS risk management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/roses-are-red-ai-is-wild-a-guide-to-ai-regulation/
-
NDSS 2025 PBP: Post-Training Backdoor Purification For Malware Classifiers
Session 12B: Malware Authors, Creators & Presenters: Dung Thuy Nguyen (Vanderbilt University), Ngoc N. Tran (Vanderbilt University), Taylor T. Johnson (Vanderbilt University), Kevin Leach (Vanderbilt University) PAPER PBP: Post-Training Backdoor Purification for Malware Classifiers In recent years, the rise of machine learning (ML) in cybersecurity has brought new challenges, including the increasing threat of backdoor…
-
NDSS 2025 PBP: Post-Training Backdoor Purification For Malware Classifiers
Session 12B: Malware Authors, Creators & Presenters: Dung Thuy Nguyen (Vanderbilt University), Ngoc N. Tran (Vanderbilt University), Taylor T. Johnson (Vanderbilt University), Kevin Leach (Vanderbilt University) PAPER PBP: Post-Training Backdoor Purification for Malware Classifiers In recent years, the rise of machine learning (ML) in cybersecurity has brought new challenges, including the increasing threat of backdoor…
-
Guide to Setting Up OpenID Connect for Enterprises
Learn how to implement OpenID Connect (OIDC) for enterprise SSO. Technical guide for engineering leaders on identity providers, scopes, and secure integration. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/guide-to-setting-up-openid-connect-for-enterprises/
-
Is SSO the Same as SAML?
Confused about sso vs saml? Learn the difference between the authentication process and the XML-based protocol. Essential guide for engineering leaders and ctos. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/is-sso-the-same-as-saml/
-
Navigating MiCA: A Practical Compliance Guide for European CASPs
MiCA creates a single EU crypto rulebook, replacing national regimes with unified licensing, capital, and compliance rules for all CASPs. First seen on hackread.com Jump to article: hackread.com/navigating-mica-compliance-guide-european-casps/
-
The Buyer’s Guide to AI Usage Control
Today’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster than security teams can track. Yet most organizations still rely on legacy controls that operate far away from where AI interactions actually occur. The result…
-
User-Managed Access (UMA) 2.0 Comprehensive Guide
Deep dive into UMA 2.0 for enterprise SSO and CIAM. Learn about protection api, RPT tokens, and how to implement party-to-party sharing in your IAM stack. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/user-managed-access-uma-2-0-comprehensive-guide/
-
SAML Development Guide
Tags: guideA comprehensive SAML development guide for engineering leaders. Learn about assertions, metadata, and securing single sign-on for enterprise CIAM. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/saml-development-guide/
-
Chinese Money Laundering Jargon via Google’s Gemini
After having a short discussion with Gemini about Chinese Money Laundering, I could tell we weren’t quite connecting on my Mandarin-assistance requests, so I shared an example post from a Telegram “Crime-as-a-Service” group that was part of a Chinese Guarantee Syndicate. For context, these posts were made in the Tudou Guarantee Syndicate’s group dedicated to…
-
Enabling and Securing Basic Authentication: A Comprehensive Guide
Learn how to enable and secure basic authentication for enterprise systems. Guide covers tls encryption, credential hygiene, and sso migration for ctos. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/enabling-and-securing-basic-authentication-a-comprehensive-guide/
-
The Ultimate Guide to Single Sign-On in 2025
Master Enterprise SSO in 2025. Learn about SAML, OIDC, and CIAM strategies for CTOs and VP Engineering to secure B2B platforms and prevent data breach. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/the-ultimate-guide-to-single-sign-on-in-2025/
-
Is Data Center Colocation Secure? What CIOs and CISOs Need to Know
Learn how secure data center colocation really is. A practical guide for CIOs and CISOs covering physical security, compliance, risk, and governance. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/is-data-center-colocation-secure-what-cios-and-cisos-need-to-know/
-
Best E-Signature Solutions For Secure Digital Signing In 2026
As digital transactions become the backbone of modern business, secure electronic signatures are no longer optional. In 2026, organizations face increasing risks related to document fraud, identity theft, and regulatory violations. Choosing the right e-signature solution is now a cybersecurity decision, not just a productivity upgrade. This guide covers the best e-signature solutions for cybersecurity,…
-
NDSS 2025 PropertyGPT
Tags: blockchain, bug-bounty, conference, crypto, guide, Internet, LLM, network, oracle, strategy, tool, vulnerability, zero-daySession 11A: Blockchain Security 2 Authors, Creators & Presenters: Ye Liu (Singapore Management University), Yue Xue (MetaTrust Labs), Daoyuan Wu (The Hong Kong University of Science and Technology), Yuqiang Sun (Nanyang Technological University), Yi Li (Nanyang Technological University), Miaolei Shi (MetaTrust Labs), Yang Liu (Nanyang Technological University) PAPER PropertyGPT: LLM-driven Formal Verification of Smart Contracts…

