Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 15 - Why banks need to treat machine identities like VIPs

In this episode of Security Matters, host David Puner speaks with Andy Parsons, CyberArk’s Director of EMEA Financial Services and Insurance, whose career spans from the British Army to CISO and CTO roles in global financial institutions. Andy shares hard-earned lessons on leadership, risk management, and the evolving cybersecurity landscape in banking—from insider threats to machine identity governance and the rise of agentic AI.

The Invisible Trick: How to Fool an AI Agent

The Invisible Trick: How to Fool an AI Agent A10 Networks' security experts, Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar, discuss a classic example of an adversarial attack that tricks an AI agent using the equivalent of invisible watermarks. Madhav explains how researchers used an invisible watermark in a research paper that, when scanned by an AI agent, would automatically trigger a positive review. This watermark was not visible to human reviewers. This clever manipulation highlights a significant vulnerability in AI models: they can be influenced by hidden data in their input.

Apono Releases MCP Server for End Users

We’re excited to announce the launch of our MCP server for end users, designed to boost engineering productivity while keeping security strong. Engineers often know exactly what they need to do—deploy to a new environment, spin up a workload, investigate logs—but not which permissions translate into those tasks. That leads to two common problems: The result is wasted time, frustrated teams, and an inflated attack surface from unnecessary standing privileges.

Torq for MDRs: Increase Margin and Onboard Customers Faster

Managed detection and response (MDR) providers faceskyrocketing demand and rising stakes. The MDR market is projected to grow to $11.8 billion by 2029 (up from $4.1 billion in 2024), a 23.5% compound annual growth rate driven by the intensifying landscape of advanced threats and sophisticated attacks, as well as ongoing cybersecurity talent shortages.

Beyond PCI and HIPAA: How Feroot Powers Connecticut Data Privacy Act (CDPA) Compliance

For many U.S. companies, the answer is yes—and not just those physically located in Connecticut. Like the CCPA in California or the CPA in Colorado, the Connecticut Data Privacy Act has an extraterritorial reach, meaning if your website, SaaS platform, or e-commerce business processes Connecticut residents’ personal data at scale, compliance is mandatory. The problem? CDPA compliance is rarely straightforward.

Multiple Login & Access Solutions for Headless Shopify Stores

Discover how to simplify and secure authentication for Shopify Hydrogen storefronts. Learn how single sign-on (SSO), social login, restricted content access, and multi-store sync can deliver a unified, user-friendly experience, powered by miniOrange’s scalable authentication solutions.

Beyond the Perimeter: A CISO's Guide to Modern Security Architecture

In this episode of Make Work Happen, JumpCloud's CISO Bob Phan sits down with Superbet CISO Alex "Jay" Balan to challenge traditional cybersecurity thinking. They discuss Jay's "internet-first" security philosophy, which advocates for a strategic shift away from outdated on-premise practices and private networks. Learn why assuming compromise, practicing "resilience through violence," and establishing a single source of truth for identity are the keys to building a more secure and efficient organization.