Application Security News and Articles
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: June 2025 Patch Tuesday forecast: Second time is the charm? Microsoft has been busy releasing more out-of-band (OOB) patches than usual ...
And what does it tell us about Cybersecurity?
As the founding CEO of StackStorm and now DeepTempo, I’ve seen how the needs of CISOs and SOCs have changed over the last 10+ years.
New challenges and a better color scheme!
When we started ...
The First Step to Integrating Security into CIContinue reading on Medium »
Is Your Organization Implementing Scalable Solutions for NHI Management? Is your business laying a solid groundwork for efficient Non-Human Identity (NHI) management? If not, you’re likely exposing your organization to unnecessary risks. Data ...
Why Does NHI Management Matter? Imagine being able to boost your confidence, largely dependent on automated processes. What if there was a way to foster a sense of security about your organization’s data management, transparency, and regulatory ...
Are You Embracing Innovation Securely? The quest for innovation is always at the forefront. Our desire to push boundaries and create more efficient and dynamic solutions is a driving force for progress. However, amid all the technological ...
How Crucial Are Robust NHI Protocols in Empowering Teams? These days, it’s a fair assumption that most businesses base a significant portion of their operations. The management of Non-Human Identities (NHIs) has become increasingly important. ...
Authors/Presenters: Daniel Klischies and David Hirsch
Our sincere appreciation to OffensiveCon by Binary Gecko, and the Presenters/Authors for publishing their outstanding OffensiveCon 2025 video content. Originating from the conference’s ...
Model Context Protocol connects AI assistants to external tools and data. Think of it as a bridge between Claude, ChatGPT, or Cursor and your Gmail, databases, or file systems. Released...
The post MCP (Model Context Protocol) and Its Critical ...
Hidden SaaS risks can quietly undermine HIPAA security safeguards. Discover how SaaS visibility and control help protect ePHI and ensure HIPAA compliance.
The post 5 SaaS Blind Spots that Undermine HIPAA Security Safeguards appeared first on ...
What Role does Certainty Play in the Management of NHIs Lifecycle? Where data breaches and cyber-threats pose significant risks, any security professional worth their salt knows the importance of having robust and efficient management practices. ...
Are You Doing Enough to Secure Your Cloud NHIs? Is your organization’s cloud security robust enough to protect your non-human identities (NHIs)? This is a question that has been increasingly haunting CISOs, cybersecurity professionals, and ...
Is Managing Non-Human Identities the Key to Achieving Robust Cloud-Native Security? Where humans and machines square off, intent on breaching each other’s defenses. However, an important facet often goes unnoticed – Non-Human Identities ...
Why is NHI Security Critical in Risk Management? Have you ever considered the potential security risk lurking? The reality is that the growing complexity of IT infrastructures, particularly in the cloud, presents new challenges for risk ...
Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead Cybersecurity 2025: The Trends Defining Risk and How to Stay Ahead The rules of cybersecurity are shifting—again. As 2025 unfolds, companies face a paradox: digital acceleration ...
Jun 06, 2025 - Lina Romero - LLM04: Data & Model Poisoning
Excerpt:
In this blog series, we’re breaking down the OWASP Top 10 risks for LLMs and explaining how each one manifests and can be mitigated. Today’s risk is #4 on the list: Data ...
Seeking a FedRAMP authority to operate is a critical part of any cloud service looking to work with the government in an official capacity. It’s required if you are going to handle controlled unclassified information on behalf of the government ...
Modern data centers stand at the heart of global business and digital innovation. But behind every rack and server, data center managers must juggle rapid advances in technology, mounting regulatory pressure, and relentless demands for efficiency ...
When the Beatles sang the famous lyric “She came in through the bathroom window,” they were riffing on a real event, a fan who bypassed the front door and broke into Paul McCartney’s home. It was a metaphor for intrusion from the ...
OpenAI just published its annual report on malicious uses of AI.
By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and expose abusive activity ...