Connecticut’s Largest Healthcare Provider Gets Breached
The post Connecticut’s Largest Healthcare Provider Gets Breached appeared first on Votiro.
The post Connecticut’s Largest Healthcare Provider Gets Breached appeared first on Security Boulevard.
The post Connecticut’s Largest Healthcare Provider Gets Breached appeared first on Votiro.
The post Connecticut’s Largest Healthcare Provider Gets Breached appeared first on Security Boulevard.
The Coinbase breach exposed more than data; it revealed what most orgs still can’t see. Learn why proactive SaaS access visibility is your real defense.
The post Coinbase Breach: Can You Act Quickly to an Insider Threat? appeared first on Security Boulevard.
Author/Presenter: George Polivka & Unnamed User
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel.
The post BSidesLV24 – GroundFloor – Rolling Out The C2: A Take On Modern Red Team Infrastructure appeared first on Security Boulevard.
Orca Security this week revealed it has acquired Opus to gain access to technologies capable of orchestrating artificial intelligence (AI) agents that are trained to automate a range of cybersecurity tasks. Opus previously has been employing that core capability to drive a vulnerability management platform that Orca Security now plans to sunset. Orca Security CEO..
The post Orca Security Acquires Opus to Gain AI Agent Orchestration Technology appeared first on Security Boulevard.
In cybersecurity, the most complex problems often do not have neat solutions. But in a recent conversation with veteran CISO Ed Amoroso and Balbix CEO and Founder Gaurav Banga, one thing was clear: we’re past the point where “we tried our best” is enough. Accountability, quantification, and context are now table stakes for any organization …
The post Why Context is King in Cyber Risk Quantification: Key Webinar Takeaways appeared first on Security Boulevard.
Machines talk to machines without human intervention. But how do you ensure these automated conversations remain secure? Discover the authentication frameworks that enable scaling safely while protecting your digital ecosystem from unauthorized access.
The post Beyond Human Access: Machine-to-Machine Authentication for Modern B2B SaaS appeared first on Security Boulevard.
The Linux Foundation this week made available a customizable reference guide intended to help organizations identify critical cybersecurity skills requirements.
The post Linux Foundation Shares Framework for Building Effective Cybersecurity Teams appeared first on Security Boulevard.
Regarding the open letter that hit a nerve at RSAC this year for calling out lack of reliability, accountability and transparency on the part of some security vendors, consider this: A security vendor that profits from providing the very data needed to detect and respond to threats is not a partner; they are a potential obstacle. True security collaboration necessitates transparent and unfettered access to logs. Watch out for security vendors who basically charge you for the info you need to fight threats: They're more of a roadblock than a helper.
The post Cybersecurity Insights with Contrast CISO David Lindner | 05/16/25 appeared first on Security Boulevard.
The major data breach of cryptocurrency exchange Coinbase could cost the company as much as $400 million, it told the SEC. However, rather than pay the $20 million extortion demand, Coinbase issued a $20 million bounty on the hackers.
The post Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty appeared first on Security Boulevard.
Defining wire communications, and whether the wiretap statute makes it illegal to listen to a podcast or watch a movie online?
The post Is it Illegal to Listen to a Podcast or Watch a Movie Online? appeared first on Security Boulevard.
Alright, you’ve come this far. You’ve admitted that your SEG isn’t exactly the security soulmate you thought it was. Maybe you’ve even started to notice the red flags – missed phishes, frustrated clients, constant rule tuning. But breaking up is a process, and before you can move on to something better, it’s important to assess the current state of the relationship.
The post Modern Threats, Missed Phish: How Exposed Are You? (Part 2) appeared first on Security Boulevard.
The SOC has long been the enterprise’s first line of defense. But despite years of investment in threat feeds and automation platforms, the same question persists: why does intelligence still struggle to translate into timely action?
Related: IBM makes the … (more…)
The post SHARED INTEL Q&A: AI in the SOC isn’t all about speed — it’s more so about smoothing process first appeared on The Last Watchdog.
The post SHARED INTEL Q&A: AI in the SOC isn’t all about speed — it’s more so about smoothing process appeared first on Security Boulevard.
In an industry currently full of noise, new logos and two-letter slides, IBM is proving that real security transformation in the AI revolution takes more than a lofty latte imbued vision.
The post IBM Reasserts Its Identity: A Modern Security Partner Rooted in Experience appeared first on Security Boulevard.
Security and trust are paramount. Whether you're running a small business or managing enterprise-level IT infrastructure, choosing the right Certificate Authority (CA) is crucial. A CA acts as a trusted authority that issues, verifies, and manages digital certificates, which are essential for secure communication and identity verification on the internet and for internal systems. This means choosing a CA that is reputable with an industry-leading reputation will set your business up to be secure and compliant.
The post Why Sectigo is the best Certificate Authority for your security needs appeared first on Security Boulevard.
A segurança digital se tornou uma prioridade inegociável. Com o avanço da tecnologia, surgem também novas ameaças digitais e uma das mais perigosas é o ataque cibernético. Empresas, governos e até mesmo usuários comuns estão constantemente na mira de criminosos digitais que buscam explorar vulnerabilidades. Mas afinal, o que é ataque cibernético, quais são os […]
The post O que é um ataque cibernético? Tipos e prevenção appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..
The post O que é um ataque cibernético? Tipos e prevenção appeared first on Security Boulevard.
Ah, RSA. That yearly theater (Carnival? Circus? Orgy? Got any better synonyms, Gemini?) of 44,000 people vaguely (hi salespeople!) related to cybersecurity … where the air is thick with buzzwords and the vendor halls echo with promises of a massive revolution — every year.
Gemini imagines RSA 2025 (very tame!)And this year, of course, the primary driver was (still) AI. To put it in a culinary analogy — as it is well known, I like my analogies well-done — if last year’s event felt like a hopeful wait for a steak (“where’s the beef?”), this year feels like we got served a plate with a lot of garnish. Very visually stimulating garnish. But still no meat.
And I still can’t shake the feeling that in a year we might be in the same place. Hopefully not.
But let’s break it down. Just like a good stew, let’s delve (guess who wrote this sentence?) into the ingredients that made up RSA 2025.
1. The AI Hype Train: All Aboard! (But Where Are We Going?)First off, let’s address the elephant in the room, or rather, the “hype-intelligent” [A.C. — I wrote this joke, not AI, cool typo, eh?] chatbot in the cloud: AI. Everyone and their grandmother seemed to have an “AI-powered” solution, some even went further for “AI-native” (more on this particular creation later).
Booths were festooned with AI logos, and conversations invariably veered towards gen AI and… yes… agentic AI too (so 2025 of them!). It was as if vendors had discovered again magical incantation that could solve all cybersecurity woes. “Add AI and bam!”, or something like that. Like perhaps zero trust in 2022 or so?
But here’s the rub: under the surface, how much was “sizzle” and how much was “steak”? As noted, many discussions felt like “AI addressable” rather than “AI solvable” (the idea for this term comes from this podcast episode, coined by Eric Foster of Tenex.AI … yes… AI). Which means, sure, we can point AI at a problem, but AI is not actually solving it completely and requires humans to do a non-trivial amount of work. But it does help!
You know those “agentic use cases”? Those real-world game changer use cases that actually deliver significant benefits right now? I was looking for them. And I didn’t find many. In fact, I didn’t find even a single robust one. And we really looked!
We saw a lot of people imagining the future of security, and I saw not much evidence of solid outcomes in the present. A lot of vendors slapped AI mentions onto their existing products (OK, some just onto their booths!), creating what I like to call “AI washing” or gratuitous mentions of AI.
So many AI applications in MDR (Managed Detection and Response) were “AI addressable but not AI solvable.” And let’s talk for a moment about the whole “AI SOC” concept. This is the dream we keep chasing. It echoes the promises made with SOAR (Security Orchestration, Automation, and Response) systems of yesteryear.
Frankly, the more I look at the “AI SOC” vendors with their “triage agents” (just $10 per alert! buy now!) the more I see SOAR circa 2015. These guys are marching towards the same general path that SOAR treaded 10 years ago, much powered by modern tools yet veering towards the same ditch…
Remember when SOAR was supposed to automate everything, eliminating the need for human intervention in security operations? How did that work out? Turns out you still need humans to remediate and interpret the (dirty) data, and deal with messed up IT environments. And I see the “AI SOC” is in danger of repeating the exact same trajectory. The idea of a fully automated security operations center powered by AI is just not realistic at all today.
So “AI in a SOC” — strong YES, “AI SOC” — hard no!
You still need people, humans, the real ones, to deal with the complicated situations, understand the context, use tribal knowledge, and make hard decisions. At most those “AI SOC” can give guidance — “LLM says, hey, you guys should consider doing blah, blah, blah” but it is ultimately humans who make the final call and do things. Today this is true. Please ask me again after RSA 2026…
2. The Resilience of the Past: What is Dead May Never Die (Or at Least Takes a Very Long Time to Do So)Another striking observation was the continued presence and resilience of “legacy” technologies and vendors (some parallels to RSA 2022, as I recall). Think about it: many vendor names that a security manager from 2004 would recognize (or their merged and renamed descendants) were still prominent on the show floor.
Mobile security, our favorite example of a security island merging with the mainland, also appeared, though not as a central theme. It seemed like many technologies thought to be on their last legs are, well, not. I was wondering who buys from “3rd tier AV vendors” or from “54th tier SIEM” vendors? What keeps them afloat? Well, I think part of it is explained by the concept of “change budget” concept, that some of my Deloitte colleagues used to explain.
Essentially, organizations have a limited capacity for change, and when they finally update one security solution, they might not have the resources or will to update others, no matter the need. We do not have capacity to change everything, all at once. Change fatigue is real!
And this inertia allows older technologies to persist, even if better alternatives are available. Change is just hard. And companies keep sticking with what is familiar and what just “works” (even if it really doesn’t). It might be inefficient, it might be outdated, but it is here and is already integrated to other systems. Which, of course, creates even more “fun” problems! Just imagine, there are still some people somewhere working with COBOL and Windows 2003. Terrifying, indeed!
3. The Security of AI: Protecting the ProtectorAn ironic twist in this AI-palooza was the relative scarcity of discussions on securing AI itself (we did a fun presentation on this BTW). While everyone was touting AI’s ability to defend systems, not enough attention was paid to defending AI systems themselves. Are we going back to the “WAF-but-for-AI” type solution? Will we build special boxes to protect those AI systems? I hope not as that would be the wrong approach. As somebody said “‘known bad’ filtering never truly works” (sounds like Marcus Ranum?)
If AI is to become a critical part of our cybersecurity infrastructure, we must ensure it is robust and resilient against attacks. But I think the relative lack of focus on this area meant that buyers aren’t ready to buy AI security or haven’t even considered it at this stage.
Think for a moment: you are ready to deploy “AI for security” but you are not yet ready to “secure AI” — including that AI you just deployed for security. Please get terrified already!
4. Quick Hits and Hallway ChatterBeyond the big themes, a few other observations:
I have a strong feeling that in a year, at RSA 2026 we might be having the same discussions. We might be again waiting for a “steak” while getting a lot of “sizzle”. We might be talking again about how “AI will fix everything” without actually seeing it fixed. We might be looking at the same old technologies staying alive for another year. I really hope I am wrong. I really want the real “game changer” AI use cases to finally emerge. We will see…
You can check out our related presentations from the conference:
And don’t forget to listen to the recap podcast that inspired some of these thoughts!
RSA 2025: AI’s Promise vs. Security’s Past — A Reality Check” was originally published in Anton on Security on Medium, where people are continuing the conversation by highlighting and responding to this story.
The post RSA 2025: AI’s Promise vs. Security’s Past — A Reality Check” appeared first on Security Boulevard.
Are Your Machine Identities Safe? Non-Human Identities (NHIs) and Secrets Security Management present a groundbreaking approach to data security. But what is the reality of your automated systems’ protection? We will explore this question, highlighting the importance of implementing a holistic security protocol. Unmasking the Digital Tourist: Non-Human Identities Comprehensively managing NHIs and their secrets […]
The post How Protected Are Your Automated Systems? appeared first on Entro.
The post How Protected Are Your Automated Systems? appeared first on Security Boulevard.
Why Do Cloud Security Gaps Exist? Can we confidently claim to have sealed all potential breaches? The truth is, despite significant investments in cybersecurity measures, gaps continue to exist. Many professionals overlook the importance of Non-Human Identities (NHIs) management. NHIs, machine identities combined with a “Secret”— an encrypted password, token, or key— are powerful tools […]
The post Is Your Cloud Truly Safe from Invisible Threats? appeared first on Entro.
The post Is Your Cloud Truly Safe from Invisible Threats? appeared first on Security Boulevard.
Why is a Comprehensive Cybersecurity Strategy Essential? A robust cybersecurity strategy is no longer a luxury but a necessity. Whether it is financial services, healthcare, or travel, organizations are making significant shifts to the digital domain. It has become critical to safeguard sensitive data from threats and risks. But how can businesses build confidence in […]
The post Building Confidence in Your Cybersecurity Strategy appeared first on Entro.
The post Building Confidence in Your Cybersecurity Strategy appeared first on Security Boulevard.
How Does Secure Access Management Fuel Innovation? Have you ever pondered the correlation between innovation security and business success? With businesses heavily rely on technology to innovate and drive growth, secure access management has become a crucial element in their strategy. It is the linchpin that binds the concepts of technological advancement and data protection, […]
The post Fostering Innovation with Secure Access Management appeared first on Entro.
The post Fostering Innovation with Secure Access Management appeared first on Security Boulevard.