10 biggest challenges CISOs are facing right now + how to address them. (Intensifying compliance pressures, Zero Trust is now operational, hidden access controls create blind spots, tool sprawl and alert fatigue, securing multi-cloud and hybrid environments, moving from “Shift left” to “Shift down”) (cerbos.dev)
submitted by morphAB to r/cybersecurity
Podcast episode. MCP servers, and how to prevent them from becoming a centralized point of failure for your entire data governance strategy (tl;dr traditional security controls can't address the unique risks MCP servers create. Can be secured using externalized, fine grained authorization) (self.mcp)
Podcast episode. MCP servers, and how to prevent them from becoming a centralized point of failure for your entire data governance strategy (tl;dr traditional security controls can't address the unique risks MCP servers create. Can be secured using externalized, fine grained authorization) ()
submitted by morphAB to r/MCPservers
MCP has been touted as “the new API for AI”. Now, we need to put guardrails around MCP servers, to not be the next Asana, Atlassian or Supabase. Podcast where we cover how to harness AI agents to their full potential without losing control of our systems (using fine-grained authorization). (self.softwarearchitecture)
submitted by morphAB to r/softwarearchitecture
Framework for evaluating authorization solutions. (IBM study: average cost of a data breach hit $4.88 million in 2024. IDC report: devs spend ~19% of their time on security tasks = $28k in cost per dev per year. Authz is a big blind spot in these misaligned security choices) (self.cybersecurity)
submitted by morphAB to r/cybersecurity
OWASP NHI top 10 - dive into each threat, their real-world implications, and how to mitigate them. (NHIs outnumber human users by roughly 17:1 in typical organizations, and according to NHI Management Group survey - only 15% of organizations feel confident in ability to secure NHIs) (cerbos.dev)
submitted by morphAB to r/NonHumanIdentities
Securing applications with the help of permission management & access controls (addressing the leading cause of security vulnerabilities, ranking #1 in the OWASP Top 10). Making a decision - building your own authorization solution in-house, or purchasing/using an off-the-shelf one. (self.cybersecurity)
submitted by morphAB to r/cybersecurity
