{"code":0,"response":[{"originalUrl":"https://securityboulevard.com/2025/12/how-secure-are-agentic-ai-systems-in-handling-sensitive-data/","appLinks":null,"description":"Why Are Non-Human Identities Crucial for Cloud Security? How do organizations ensure robust security when integrating complex technologies like Agentic AI into their infrastructure? This is a pivotal question, especially when considering cloud security and the management of Non-Human Identities (NHIs). NHIs, representing machine identities combined with their respective secrets and permissions, stand at the The post How secure are Agentic AI systems in handling sensitive data appeared first on Entro.","title":"How secure are Agentic AI systems in handling sensitive data","embeds":null,"media":null,"posts":1,"content":null,"keywords":[],"url":"https://securityboulevard.com/2025/12/how-secure-are-agentic-ai-systems-in-handling-sensitive-data/","likes":0,"images":[{"url":"//c.disquscdn.com/get?url=https%3A%2F%2Fsecurityboulevard.com%2Fwp-content%2Fuploads%2F2018%2F01%2FTwitterLogo-002.jpg&key=GIlATyQ7Fwx9JJoflVg34Q","width":150,"height":80}],"type":null,"id":10851483950,"createdAt":"2025-12-30T04:53:17","forumName":"Security Boulevard"},{"originalUrl":"https://securityboulevard.com/2025/09/avoiding-2fa-for-local-accounts-best-practices/","appLinks":null,"description":"Explore best practices for avoiding 2FA on local accounts while maintaining strong security. Learn about alternative authentication methods and robust security policies.","title":"Avoiding 2FA for Local Accounts: Best Practices","embeds":null,"media":null,"posts":1,"content":null,"keywords":[],"url":"https://securityboulevard.com/2025/09/avoiding-2fa-for-local-accounts-best-practices/","likes":0,"images":[{"url":"//c.disquscdn.com/get?url=https%3A%2F%2Fcdn.pseo.one%2F67b62b766899109fe72fb789%2F687e6cccf6fe799d28851ea0%2Favoiding-2fa-for-local-accounts-best-practices%2Fmermaid-diagram-1.svg&key=g6cP2WK60EnCgtOZ8NxxNQ","width":150,"height":80}],"type":null,"id":10628844720,"createdAt":"2025-09-25T15:52:28","forumName":"Security Boulevard"},{"originalUrl":"https://securityboulevard.com/2025/10/exciting-developments-in-cloud-native-security-2/","appLinks":null,"description":"Are Machine Identities the Hidden Key to Cloud-Native Security? Effective cybersecurity strategies rely not only on safeguarding human credentials but also on ensuring the security of non-human identities (NHIs). These machine identities, often overshadowed by their human counterparts, play a crucial role. But what exactly are NHIs, and why should they be prioritized? Understanding Non-Human The post Exciting Developments in Cloud-Native Security appeared first on Entro.","title":"Exciting Developments in Cloud-Native Security","embeds":null,"media":null,"posts":1,"content":null,"keywords":[],"url":"https://securityboulevard.com/2025/10/exciting-developments-in-cloud-native-security-2/","likes":0,"images":[{"url":"//c.disquscdn.com/get?url=https%3A%2F%2Fsecurityboulevard.com%2Fwp-content%2Fuploads%2F2018%2F01%2FTwitterLogo-002.jpg&key=GIlATyQ7Fwx9JJoflVg34Q","width":150,"height":80}],"type":null,"id":10650513790,"createdAt":"2025-10-09T00:21:31","forumName":"Security Boulevard"},{"originalUrl":"https://securityboulevard.com/2026/01/email-first-cybersecurity-predictions-for-2026/","appLinks":null,"description":"Explore key cybersecurity predictions for 2026, from AI-powered phishing to DMARC enforcement, BIMI adoption, SPF and DKIM limits, Zero Trust, and automation.","title":"Email-first cybersecurity predictions for 2026","embeds":null,"media":null,"posts":1,"content":null,"keywords":[],"url":"https://securityboulevard.com/2026/01/email-first-cybersecurity-predictions-for-2026/","likes":0,"images":[{"url":"//c.disquscdn.com/get?url=https%3A%2F%2Fsecurityboulevard.com%2Fwp-content%2Fuploads%2F2018%2F01%2FTwitterLogo-002.jpg&key=GIlATyQ7Fwx9JJoflVg34Q","width":150,"height":80}],"type":null,"id":10857725155,"createdAt":"2026-01-02T10:22:41","forumName":"Security Boulevard"},{"originalUrl":"https://securityboulevard.com/2025/12/bangalore-mncs-under-cyber-siege-why-indias-silicon-valley-faces-a-new-era-of-risk-and-how-unified-security-platforms-are-becoming-essential/","appLinks":null,"description":"Bangalore is the beating heart of India\u2019s technology landscape, a global hub where innovation, data, and enterprise operations converge at unprecedented scale. But a new report highlights a stark reality: as digital acceleration skyrockets, so do the cyber risks facing the multinational organizations (MNCs) operating here. With the DPDP Act 2023 reshaping compliance expectations and The post Bangalore MNCs Under Cyber Siege: Why India\u2019s Silicon Valley Faces a New Era of Risk and How Unified Security Platforms Are Becoming Essential appeared first on Seceon Inc.","title":"Bangalore MNCs Under Cyber Siege: Why India\u2019s Silicon Valley Faces a New Era of Risk and How Unified Security Platforms Are Becoming Essential","embeds":null,"media":null,"posts":1,"content":null,"keywords":[],"url":"https://securityboulevard.com/2025/12/bangalore-mncs-under-cyber-siege-why-indias-silicon-valley-faces-a-new-era-of-risk-and-how-unified-security-platforms-are-becoming-essential/","likes":0,"images":[{"url":"//c.disquscdn.com/get?url=https%3A%2F%2Fsecurityboulevard.com%2Fwp-content%2Fuploads%2F2018%2F01%2FTwitterLogo-002.jpg&key=GIlATyQ7Fwx9JJoflVg34Q","width":150,"height":80}],"type":null,"id":10849970861,"createdAt":"2025-12-29T16:21:28","forumName":"Security Boulevard"},{"originalUrl":"https://securityboulevard.com/2025/08/kill-the-password-a-developers-guide-to-passwordless-authentication-nirvana/","appLinks":null,"description":"A comprehensive guide for developers on implementing passwordless authentication. Explore various methods, improve security, and enhance user experience. Learn to kill the password!","title":"Kill the Password: A Developer\u2019s Guide to Passwordless Authentication Nirvana","embeds":null,"media":null,"posts":1,"content":null,"keywords":[],"url":"https://securityboulevard.com/2025/08/kill-the-password-a-developers-guide-to-passwordless-authentication-nirvana/","likes":0,"images":[{"url":"//c.disquscdn.com/get?url=https%3A%2F%2Fsecurityboulevard.com%2Fwp-content%2Fuploads%2F2018%2F01%2FTwitterLogo-002.jpg&key=GIlATyQ7Fwx9JJoflVg34Q","width":150,"height":80}],"type":null,"id":10610440569,"createdAt":"2025-08-28T08:24:31","forumName":"Security Boulevard"},{"originalUrl":"https://securityboulevard.com/2026/02/the-apple-google-ai-deal-what-1-billion-says-about-whos-really-winning-the-ai-race/","appLinks":null,"description":"Apple chose Google's Gemini over ChatGPT for Siri's AI upgrade. This $1B/year deal reveals who's actually winning the AI race\u2014and it's not who you think.","title":"The Apple-Google AI Deal: What $1 Billion Says About Who\u2019s Really Winning the AI Race","embeds":null,"media":null,"posts":1,"content":null,"keywords":[],"url":"https://securityboulevard.com/2026/02/the-apple-google-ai-deal-what-1-billion-says-about-whos-really-winning-the-ai-race/","likes":0,"images":[{"url":"//c.disquscdn.com/get?url=https%3A%2F%2Fimages.unsplash.com%2Fphoto-1656099707461-d9a6d60a6783%3Fcrop%3Dentropy%26cs%3Dtinysrgb%26fit%3Dmax%26fm%3Djpg%26ixid%3DM3wxMTc3M3wwfDF8c2VhcmNofDN8fGFwcGxlJTIwc2lyaSUyMGdvb2dsZXxlbnwwfHx8fDE3NzEzMTA1Nzl8MA%26ixlib%3Drb-4.1.0%26q%3D80%26w%3D2000&key=02QK0edqC2LcxvDfK9jAKA","width":150,"height":80}],"type":null,"id":10941607576,"createdAt":"2026-02-23T16:15:08","forumName":"Security Boulevard"},{"originalUrl":"https://securityboulevard.com/2025/09/harrods-data-breach-explained/","appLinks":null,"description":"On Friday, September 26\u201327, 2025 (UK time), Harrods warned that a third-party provider suffered an intrusion that exposed some online customers\u2019 basic personal details (names and contact information). Harrods says its own systems weren\u2019t breached, payment data and passwords weren\u2019t taken, and the incident is separate from hacking activity it faced earlier this year. Authorities The post Harrods Data Breach Explained appeared first on Centraleyes.","title":"Harrods Data Breach Explained","embeds":null,"media":null,"posts":1,"content":null,"keywords":[],"url":"https://securityboulevard.com/2025/09/harrods-data-breach-explained/","likes":0,"images":[{"url":"//c.disquscdn.com/get?url=https%3A%2F%2Fsecurityboulevard.com%2Fwp-content%2Fuploads%2F2018%2F01%2FTwitterLogo-002.jpg&key=GIlATyQ7Fwx9JJoflVg34Q","width":150,"height":80}],"type":null,"id":10633392976,"createdAt":"2025-09-30T11:55:10","forumName":"Security Boulevard"}]}