Tag: best-practice
-
4 ways to prepare your SOC for agentic AI
Tags: access, ai, attack, automation, best-practice, cloud, compliance, control, cybersecurity, data, defense, detection, edr, framework, governance, guide, identity, injection, intelligence, least-privilege, metric, mitre, radius, RedTeam, risk, siem, skills, soar, soc, threat, toolBuild capabilities for AI governance, content and quality: Upskilling existing analysts alone is not enough. As AI agents begin operating across tools, making decisions and triggering actions with minimal human involvement, the demands on the SOC will extend well beyond traditional analyst capabilities, experts say.Content engineering, for instance, is one emerging requirement. In an AI-enabled…
-
Surviving Ransomware: Best practices to safeguard your business
By Robbie Ross, cyber security lead, Converged Communication Solutions It’s not if but when. This is a phrase that has been echoed across the cyber security industry for several years, but when it comes to ransomware the message is still not penetrating widely enough. The 2025 UK Government Cyber Breaches Survey highlighted that just 32%…
-
OAuth security guide: Flows, vulnerabilities and best practices
OAuth is a commonly used authorisation framework, that allows websites and web applications to request limited access to a user’s account on another application. Users can grant this limited access to their account, without ever needing to expose their password with the requesting website or application. This is commonly seen with sites that allow you”¦…
-
Why Most Breaches Happen After Launch: SaaS Security Testing Best Practices
As SaaS platforms expand in complexity, security cannot stop at deployment. Post-launch environments introduce new integrations, user access changes, and configuration updates that significantly increase risk exposure. Without continuous validation and monitoring, vulnerabilities can quietly develop into major breaches. A structured and ongoing security strategy, supported by experts like StrongBox IT, helps organisations reduce these……
-
From in-house CISO to consultant. What you need to know before making the leap
Tags: advisory, best-practice, business, ciso, compliance, control, cybersecurity, framework, jobs, resilience, risk, service, skills, toolSkills that carry over into consulting: Many of the skills CISOs honed inside large organizations translate directly to the new consulting job, while others suddenly matter more than they ever did before. In addition to technical skills, it is often the practical ones that prove most valuable.The ability to prioritize, sharpened over years in a…
-
From in-house CISO to consultant. What you need to know before making the leap
Tags: advisory, best-practice, business, ciso, compliance, control, cybersecurity, framework, jobs, resilience, risk, service, skills, toolSkills that carry over into consulting: Many of the skills CISOs honed inside large organizations translate directly to the new consulting job, while others suddenly matter more than they ever did before. In addition to technical skills, it is often the practical ones that prove most valuable.The ability to prioritize, sharpened over years in a…
-
Managing a Security Token Service
Learn how to manage a Security Token Service (STS) for enterprise SSO and CIAM. Best practices for token issuance, rotation, and scaling for CTOs. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/managing-a-security-token-service/
-
AIs Are Getting Better at Finding and Exploiting Security Vulnerabilities
Tags: ai, attack, best-practice, breach, cve, cyber, data, exploit, kali, linux, network, open-source, tool, update, vulnerabilityFrom an Anthropic blog post: In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only standard, open-source tools, instead of the custom tools needed by previous generations. This illustrates how barriers to the use of AI in relatively autonomous…
-
What are the best practices for NHI management
How Secure Are Your Non-Human Identities? Imagine you’re managing a bustling airport, where travelers are constantly arriving and departing. Now, replace those travelers with machine identities, and you’re picturing the modern cloud environment. Non-Human Identities (NHIs) represent these machine identities, analogous to travelers, each carrying encrypted “passports” in the form of passwords, tokens, or keys….…
-
Best Practices für Monitoring & Observability – Wie sich Warnmeldungen sinnvoll steuern lassen
First seen on security-insider.de Jump to article: www.security-insider.de/wie-sich-warnmeldungen-sinnvoll-steuern-lassen-a-d9ab9191e46abdd38a60c1ba4b4880d4/
-
AirDrop Security in iOS 26.2: Time Limits, Codes Privacy Best Practices
In this episode, we explore the latest changes to AirDrop in iOS 26.2 and how they enhance privacy and security. Learn about the new 10-minute limitation on the ‘Everyone’ setting and the introduction of AirDrop codes for safer file sharing with non-contacts. We also discuss best practices for configuring your AirDrop settings to safeguard your……
-
AirDrop Security in iOS 26.2: Time Limits, Codes Privacy Best Practices
In this episode, we explore the latest changes to AirDrop in iOS 26.2 and how they enhance privacy and security. Learn about the new 10-minute limitation on the ‘Everyone’ setting and the introduction of AirDrop codes for safer file sharing with non-contacts. We also discuss best practices for configuring your AirDrop settings to safeguard your……
-
AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities
Really interesting blog post from Anthropic: In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only standard, open-source tools, instead of the custom tools needed by previous generations. This illustrates how barriers to the use of AI in relatively…
-
13 cyber questions to better vet IT vendors and reduce third-party risk
Tags: access, api, attack, authentication, automation, best-practice, breach, business, ceo, ciso, cloud, compliance, control, credentials, credit-card, cyber, cyberattack, cybercrime, cybersecurity, data, detection, endpoint, exploit, extortion, firewall, healthcare, identity, incident response, infrastructure, insurance, international, ISO-27001, jobs, least-privilege, mfa, monitoring, network, nist, password, PCI, penetration-testing, radius, ransomware, risk, saas, sans, security-incident, service, supply-chain, threat, update, vpn, vulnerabilityVital vendor questions CISOs should ask: To gain that critical information, security leaders and experts recommend CSOs ask IT partners the following cyber-specific questions. 1. What attestation will you provide to prove proper security controls are in place? These are essential, says Juan Pablo Perez-Etchegoyen, CTO for cybersecurity and compliance platform Onapsis. Some of the…
-
13 cyber questions to better vet IT vendors and reduce third-party risk
Tags: access, api, attack, authentication, automation, best-practice, breach, business, ceo, ciso, cloud, compliance, control, credentials, credit-card, cyber, cyberattack, cybercrime, cybersecurity, data, detection, endpoint, exploit, extortion, firewall, healthcare, identity, incident response, infrastructure, insurance, international, ISO-27001, jobs, least-privilege, mfa, monitoring, network, nist, password, PCI, penetration-testing, radius, ransomware, risk, saas, sans, security-incident, service, supply-chain, threat, update, vpn, vulnerabilityVital vendor questions CISOs should ask: To gain that critical information, security leaders and experts recommend CSOs ask IT partners the following cyber-specific questions. 1. What attestation will you provide to prove proper security controls are in place? These are essential, says Juan Pablo Perez-Etchegoyen, CTO for cybersecurity and compliance platform Onapsis. Some of the…
-
OAuth2 Identity Provider Setup: Complete Implementation Guide
Learn how to setup an OAuth2 Identity Provider for enterprise SSO. Detailed guide on implementation, security, and CIAM best practices for engineering leaders. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/oauth2-identity-provider-setup-complete-implementation-guide/
-
OAuth Authorization Server Setup: Implementation Guide Configuration
Learn how to build and configure an enterprise-grade OAuth authorization server. Covering PKCE, grant types, and CIAM best practices for secure SSO. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/oauth-authorization-server-setup-implementation-guide-configuration/
-
One click is all it takes: How ‘Reprompt’ turned Microsoft Copilot into data exfiltration tools
What devs and security teams should do now: As in usual security practice, enterprise users should always treat URLs and external inputs as untrusted, experts advised. Be cautious with links, be on the lookout for unusual behavior, and always pause to review pre-filled prompts.”This attack, like many others, originates with a phishing email or text…
-
Using JWT as API Keys: Security Best Practices Implementation Guide
Learn how to use JWT as API keys for enterprise apps. We cover security best practices, oidc integration, and avoiding common auth breaches. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/using-jwt-as-api-keys-security-best-practices-implementation-guide/

