Non-human identities represent a vast chunk of credentials used by a typical organization, up to 50 times higher than the number of human identities. Here is an explanation of OWASP’s new Top 10 guide to securing NHIs.
Misconfigured cybersecurity products can be gateways to a breach – this guide from the NSA and CISA identifies key weak spots in software configuration that can be corrected.
Die OWASP-Checkliste für AI Cybersecurity und -Governance verspricht schnelle Unterstützung für Unternehmen, um generative KI sicher einzusetzen.
Most organizations are still immature when it comes to identifying open-source dependencies that can usher in a host of problems when dealing with vulnerabilities.
MITRE’s ATLAS threat landscape knowledge base for artificial intelligence is a comprehensive guide to the tactics and processes bad actors use to compromise and exploit AI systems.
There are many good reasons to embrace ADR as a security staple and a whole lot more why other technologies can’t address all the security needs of applications running out there in the wild.
For every 1,000 human users, most networks have around 10,000 NHIs, and that can be a huge task to manage. Here are 3 fundamental areas to focus on when securing NHIs.
Open source software is the bedrock of modern software development, but it can also be a weak link in the software supply chain. Here are the biggest risks — and tips on how to safely use OSS components.