breaches

JFK and the Houthis: Haste Makes Waste of Security
Rather than simply exposing buried truths of the assassination, the final tranche of JFK files also exposed the personal information, including social security numbers, of a parade of people associated with the ...
Security Boulevard

GitHub Action Supply Chain Breach Exposes Non-Human Identity Risks in CI/CD
4 min readLong-lived credentials and secrets fueled the attack. The post GitHub Action Supply Chain Breach Exposes Non-Human Identity Risks in CI/CD appeared first on Aembit ...

BreachRx Brings Generative AI to Security Incident Management
BreachRx this week added generative artificial intelligence (GenAI) capabilities to a security incident platform that promises to streamline workflows across all the stakeholders that need to collaborate ...
Security Boulevard

OWASP’s Top Security Risks for Non-Human Identities and How to Address Them
5 min readWe deep dive into the first-ever NHI threat list – exploring each risk, real-world breaches that prove the threat is real, and how to defend against them. The post OWASP’s ...

DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation
If a company has effective insurance, prevention becomes even less cost-effective. By failing to “value” privacy alone, the system skews in favor of not protecting privacy ...
Security Boulevard

From Defense to Offense: Inside-Out Data Security Strategies for CISOs in 2025
Challenging the status quo and advocates for “inside-out” security, placing data at the heart of the strategy from the very beginning, rather than securing it last ...
Security Boulevard
DOGE as a National Cyberattack
In the span of just weeks, the US government has experienced what may be the most consequential security breach in its history—not through a sophisticated cyberattack or an act of foreign espionage, ...

BeyondTrust Breach Exposes API Key Abuse Risks
3 min readWhen a single API key compromise spiraled into a broader attack, it exposed how overlooked non-human identities can become gateways for escalating threats. The post BeyondTrust Breach Exposes API Key ...

Mass Breaches in the Age of AI
Targeted Scams & What to do About Them Chris Clements, VP of Solutions Architecture Companies that have suffered massive data breaches are quick to downplay the risks, but they’re ignoring the elephant ...

Are We Too Trusting of Employees?
Trust is not a one-way street. Employees who trust their organization and leadership are one lane, but the organization must trust its employees, too ...
Security Boulevard