The Fragmentation Problem in CTI and OSINT Investigations Cyber threat intelligence (CTI) and open-source intelligence (OSINT) workflows are often flooded with fragmented identity data – leaked credentials, infostealer logs, dark web posts, and forum aliases. While this data holds enormous…
Tag: Security Boulevard
Doing the Heavy Lifting: MITRE ATT&CK v17 Updates in Tidal Cyber
ATT&CK v17 We are excited to announce that the Tidal Cyber Enterprise and Community Editions are now on the new v17 version of MITRE ATT&CK. Like we do with every ATT&CK update, we’ve done the heavy lifting to analyze the…
Asian Scam Farms: ‘Industrial Scale,’ Warns UN Report
Bacon Redux: Pig butchering and other serious scams still thriving, despite crackdowns in Dubai and Myanmar The post Asian Scam Farms: ‘Industrial Scale,’ Warns UN Report appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…
Delinea Adds Ability to Secure AI Agent Identities
Delinea today extended the reach of its platform for securing identities and credentials to now provide support for artificial intelligence (AI) agents. The post Delinea Adds Ability to Secure AI Agent Identities appeared first on Security Boulevard. This article has…
Post-Quantum Cryptography: Defending Against Tomorrow’s Threats Today
By performing a cryptographic key assessment (CKA), developing a PQC encryption strategy and prioritizing cryptoagility, organizations can prepare for quantum computing cyberthreats. The post Post-Quantum Cryptography: Defending Against Tomorrow’s Threats Today appeared first on Security Boulevard. This article has been…
CISA BOD 25-01 Compliance: What U.S. Government Agencies Need to Know
U.S. government agencies are required to bring their Microsoft 365 cloud services into compliance with a recent Binding Operational Directive. Here’s how Tenable can help. Overview Malicious threat actors are constantly targeting cloud environments. The risk of compromise can be…
Verizon 2025 DBIR: Tenable Research Collaboration Shines a Spotlight on CVE Remediation Trends
The 2025 Verizon Data Breach Investigations Report (DBIR) reveals that vulnerability exploitation was present in 20% of breaches — a 34% increase year-over-year. To support the report, Tenable Research contributed enriched data on the most exploited vulnerabilities. In this blog,…
Cloud-Native Security: Assurance for Tech Leaders
Why Should Tech Leaders Place Their Trust in Cloud-Native Security? Let’s ask another question: What better assurance for tech leaders than a robust system that offers comprehensive end-to-end protection? This is precisely what cloud-native security does, and why it is…
Driving Innovation through Secure NHI Lifecycle Management
How Can Secure NHI Lifecycle Management Drive Innovation? Do we ever ponder the security of our machine identities? This question becomes increasingly pertinent as more organizations rely on cloud-based platforms for their operations. These are often a fertile playground for…
Secrets Management Solutions That Fit Your Budget
How Can Budget-Friendly Secrets Management Boost Your Cybersecurity Strategy? Navigating vast of cybersecurity can often seem like attempting to solve an intricate puzzle. One key piece that often gets overlooked is the management of Non-Human Identities (NHIs) and their associated…