BlueFlag Security Emerges From Stealth With $11.5M in Funding

BlueFlag Security emerges from stealth mode with $11.5 million in a seed funding round led by Maverick Ventures and Ten Eleven Ventures.
The post BlueFlag Security Emerges From Stealth With $11.5M in Funding appeared first on SecurityWeek.
Continue reading BlueFlag Security Emerges From Stealth With $11.5M in Funding

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

Organizations are knowingly releasing vulnerable applications

92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers share application security duties In recent years the responsibility for appli… Continue reading Organizations are knowingly releasing vulnerable applications

Cyber Insights 2024: APIs – A Clear, Present, and Future Danger

The API attack surface is expanding and API vulnerabilities are growing. AI will help attackers find and exploit API vulnerabilities at scale.
The post Cyber Insights 2024: APIs – A Clear, Present, and Future Danger appeared first on SecurityWeek.
Continue reading Cyber Insights 2024: APIs – A Clear, Present, and Future Danger

How threat actors abuse OAuth apps

OAuth apps have become prominent in several attack groups’ TTPs in recent years. OAuth apps are used for every part of the attack process. In this Help Net Security video, Tal Skverer, Research Team Lead at Astrix Security, shares insights on how… Continue reading How threat actors abuse OAuth apps