Video Interviews
Flipping the Script: The Premiere of ‘The Women in Security’ Documentary at RSAC
The cybersecurity industry has long grappled with a significant representation gap, but a new documentary premiering at RSAC 2026 is ...
Bridging the Gap: CSA’s AI Security Initiatives at RSAC
Alan Shimel sits down with longtime friend and cybersecurity veteran Rich Mogull to discuss his new role as chief analyst ...
Incident Response
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Incident Response Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
DOJ Disrupts Botnets, But DDoS Threats Remain, Security Pros Warn
Cybersecurity Data Privacy Data Security Endpoint Featured Incident Response Malware Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
FBI Seizes Two Websites Linked to Pro-Iranian Group Handala
IoT & ICS Security
Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access IoT & ICS Security Mobile Security Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
Iran-Linked Threat Group Hacks FBI Director Kash Patel’s Personal Email
Industry Spotlight

Featured Industry Spotlight Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Uncategorized
The Lock, Not the Alarm: How Palo Alto’s Koi Acquisition Rewrites Endpoint Security
Feb 18 | Jack Poller
Comments Off on The Lock, Not the Alarm: How Palo Alto’s Koi Acquisition Rewrites Endpoint Security
The acquisition of Koi Security isn’t just a product play — it’s a declaration that the agentic era has created an entirely new threat surface, and the vendor who governs it first will own the next decade of enterprise security. The Week That Rewrote the Threat Model One week after closing a $25 billion acquisition..

Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Malware Mobile Security Network Security Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
Use of XMRig Cryptominer by Threat Actors Expanding: Expel

Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Malware Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight
Malware Campaign Abuses Booking.com Against Hospitality Sector

Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches
Google Chrome Extension is Intercepting Millions of Users’ AI Chats
Dec 17 | Jeffrey Burt
Comments Off on Google Chrome Extension is Intercepting Millions of Users’ AI Chats

Cloud Security Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Industry Spotlight Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches
Hackers Steal Personal Data in 700Credit Breach Affecting 5.6 Million
Dec 15 | Jeffrey Burt
Comments Off on Hackers Steal Personal Data in 700Credit Breach Affecting 5.6 Million
Sponsored Content

Security at Scale: How Open VSX Is Raising the Bar
Security work is often most visible when something goes wrong: a compromised package, a leaked credential, a typosquatted extension, an abused automation token. In those moments, it becomes clear that software infrastructure is not abstract. It is operational, exposed, and trusted far more often than it is inspected. Open VSX belongs to that category of..

Zero-Trust Isn’t Optional Anymore—It’s Your AI Agent Fire Drill
Jan 12 | Alan Shimel
Comments Off on Zero-Trust Isn’t Optional Anymore—It’s Your AI Agent Fire Drill
Click here for Industry spotlight inclusion guidelines
The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content. While there are vendor blogs in the Security Bloggers Network, original content from these vendors are featured here. The articles here must meet several criteria to be published:
- * Must be original when published
- * Must be vendor neutral
- * Must be transparent as to authorship
- * Must be of value to the community
















