From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

From federation to fabric: IAM’s evolution

In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that […]

The post From federation to fabric: IAM’s evolution appeared first on Security Intelligence.

Continue reading From federation to fabric: IAM’s evolution

Organizations are knowingly releasing vulnerable applications

92% of companies had experienced a breach in the prior year due to vulnerabilities of applications developed in-house, according to Checkmarx. AppSec managers and developers share application security duties In recent years the responsibility for appli… Continue reading Organizations are knowingly releasing vulnerable applications

Cyber Insights 2024: APIs – A Clear, Present, and Future Danger

The API attack surface is expanding and API vulnerabilities are growing. AI will help attackers find and exploit API vulnerabilities at scale.
The post Cyber Insights 2024: APIs – A Clear, Present, and Future Danger appeared first on SecurityWeek.
Continue reading Cyber Insights 2024: APIs – A Clear, Present, and Future Danger

How threat actors abuse OAuth apps

OAuth apps have become prominent in several attack groups’ TTPs in recent years. OAuth apps are used for every part of the attack process. In this Help Net Security video, Tal Skverer, Research Team Lead at Astrix Security, shares insights on how… Continue reading How threat actors abuse OAuth apps

Google Contributes $1 Million to Rust, Says It Prevented Hundreds of Android Vulnerabilities

Google announces $1 million investment in improving Rust’s interoperability with legacy C++ codebases.
The post Google Contributes $1 Million to Rust, Says It Prevented Hundreds of Android Vulnerabilities appeared first on SecurityWeek.
Continue reading Google Contributes $1 Million to Rust, Says It Prevented Hundreds of Android Vulnerabilities