Identity & Access

Whistleblower: Musk’s DOGE Stole Data, Caused Breach at U.S. Agency
A whistleblower in the NLRB said in sworn testimony that staffers within the Musk-led DOGE group breached agency systems, exfiltrated sensitive data, and used tools and techniques similar to those wielded by ...
Security Boulevard

MITRE Crisis: CVE Cash Ends TODAY — CISA says ‘No Lapse’
Richi Jennings | | cisa, CISA Research, common vulnerabilities and exposures, CVE, CVE (Common Vulnerabilities and Exposures), CVE database, CVE Program, Cybersecurity and Infrastructure Security Agency, cybersecurity funding, Department of Homeland Security, DHS, Funding & Grants, MITRE, MITRE Framework, National Institute of Standards and Technology, National Institute of Standards and Technology (NIST), NIST, SB Blogwatch, U.S. Department of Homeland Security
These are “interesting” times: U.S. government funding for the Common Vulnerabilities and Exposures program expires April 16 ...
Security Boulevard

Open Source CIAM: A Practical Guide for the Modern Enterprise
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Best Practices, CIAM, Cyber Security, Digital Identity, experience, future, iam, open source
Struggling with proprietary identity solutions? This comprehensive guide explores how open source CIAM platforms offer enterprises transparency, flexibility, & cost control while maintaining robust security. Compare leading solutions and discover which best ...
Modern CIAM: Features and Trends
Dev Kumar | | AI, analysis, Authentication, B2C, CIAM, Cybersecurity, Passkeys, passwordless, trends
Modern CIAM has evolved far beyond simple authentication to become a strategic asset for digital businesses. By balancing robust security with seamless user experiences and comprehensive privacy controls, CIAM enables organizations to ...

The AI Forgery Epidemic: The Growing Threat of AI-Generated Fake Documents
Bojan Simic, CEO, HYPR | | Authentication, FIDO, Identity Verification, Passkeys, passwordless, Perspectives
As CEO of HYPR, I spend a lot of time thinking about the future of identity security. And right now, one of the most significant shifts we're witnessing is driven by the ...

Public Support Emerges for Chris Krebs, SentinelOne After Trump Memo
The cybersecurity industry has been conspicuously quiet after President Trump targeted ex-CISA director Chris Krebs and SentinelOne for retribution. However, some voices have risen above the silence to urge support and the ...
Security Boulevard

The Science of Password Protection: Understanding Hashing, Salting, and the Future of Authentication
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | AI (Artificial Intelligence), Authentication, future, future of passwords, hashing, Innovation, Password, passwordless
Uncover the mechanics of password hashing and salting, and how these techniques are pivotal in defending against cyber threats. ...

Password Hashing: What Cyber Pros Need to Know
Password hashing is the process of converting a plain-text password into a fixed-length string of characters (called a hash) using a one-way cryptographic algorithm. ...
Adaptive MFA: The Future of Dynamic Identity Security in 2025
Adaptive MFA is no longer optional—it’s a strategic imperative. By blending contextual intelligence with user-centric design, businesses can thwart cyber threats, comply with regulations, and foster trust in an increasingly digital world ...

Microsoft Moves Forward With Controversial Recall Feature
Microsoft a year ago was about to launch Recall, a Windows feature for Copilot+ PCs that takes regular screenshots of users' systems and stores them so they can be searched for later ...
Security Boulevard