May 08, 2025

May 08, 2025

Security Tools Alone Don't Protect You — Control Effectiveness Does

Buying more tools has long been considered the key to cybersecurity performance. Yet the facts tell a different story. According to the Gartner report, "misconfiguration of technical security controls is a leading cause for the continued success of attacks." Many organizations have impressive inventories of firewalls, endpoint solutions, identity tools, SIEMs, and other controls. Yet breaches continue because these tools are often misconfigured, poorly integrated, or disconnected from actual business risks. ... Moving toward true control effectiveness takes more than just a few technical tweaks. It requires a real shift - in mindset, in day-to-day practice, and in how teams across the organization work together. Success depends on stronger partnerships between security teams, asset owners, IT operations, and business leaders. Asset owners, in particular, bring critical knowledge to the table - how their systems are built, where the sensitive data lives, and which processes are too important to fail. Supporting this collaboration also means rethinking how we train teams. ... Making security controls truly effective demands a broader shift in how organizations think and work. Security optimization must be embedded into how systems are designed, operated, and maintained - not treated as a separate function.


APIs: From Tools to Business Growth Engines

Apart from earning revenue, APIs also offer other benefits, including providing value to customers, partners and internal stakeholders through seamless integration and improving response time. By integrating third-party services seamlessly, APIs allow businesses to offer feature-rich, convenient and highly personalized experiences. This helps improve the "stickiness" of the customer and reduces churn. ... As businesses adopt cloud solutions, develop mobile applications and transition to microservice architectures, APIs have become a critical foundation of technological innovation. But their widespread use presents significant security risks. Poorly secured APIs can be prone to becoming cyberattack entry points, potentially exposing sensitive data, granting unauthorized access or even leading to extensive network compromises. ... Managing the API life cycle using specialized tools and frameworks is also essential. This ensures a structured approach in the seven stages of API life cycle: design, development, testing, deployment, API performance monitoring, maintenance and retirement. This approach maximizes their value while minimizing risks. "APIs should be scalable and versioned to prevent breaking changes, with clear documentation for adoption. Performance should be optimized through rate limiting, caching and load balancing ..." Musser said.


How to Slash Cloud Waste Without Annoying Developers

Waste in cloud spending is not necessarily due to negligence or a lack of resources; it’s often due to poor visibility and understanding of how to optimize costs and resource allocations. Ironically, Kubernetes and GitOps were designed to enable DevOps practices by providing building blocks to facilitate collaboration between operations teams and developers ... ScaleOps’ platform serves as an example of an option that abstracts and automates the process. It’s positioned not as a platform for analysis and visibility but for resource automation. ScaleOps automates decision-making by eliminating the need for manual analysis and intervention, helping resource management become a continuous optimization of the infrastructure map. Scaling decisions, such as determining how to vertically scale, horizontally scale, and schedule pods onto the cluster to maximize performance and cost savings, are then made in real time. This capability forms the core of the ScaleOps platform. Savings and scaling efficiency are achieved through real-time usage data and predictive algorithms that determine the correct amount of resources needed at the pod level at the right time. The platform is “fully context-aware,” automatically identifying whether a workload involves a MySQL database, a stateless HTTP server, or a critical Kafka broker, and incorporating this information into scaling decisions, Baron said.


How to Prevent Your Security Tools from Turning into Exploits

Attackers don't need complex strategies when some security tools provide unrestricted access due to sloppy setups. Without proper input validation, APIs are at risk of being exploited, turning a vital defense mechanism into an attack vector. Bad actors can manipulate such APIs to execute malicious commands, seizing control over the tool and potentially spreading their reach across your infrastructure. Endpoint detection tools that log sensitive credentials in plain text worsen the problem by exposing pathways for privilege escalation and further compromise. ... If monitoring tools and critical production servers share the same network segment, a single compromised tool can give attackers free rein to move laterally and access sensitive systems. Isolating security tools into dedicated network zones is a best practice to prevent this, as proper segmentation reduces the scope of a breach and limits the attacker's ability to move laterally. Sandboxing adds another layer of security, too. ... Collaboration is key for zero trust to succeed. Security cannot be siloed within IT; developers, operations, and security teams must work together from the start. Automated security checks within CI/CD pipelines can catch vulnerabilities before deployment, such as when verbose logging is accidentally enabled on a production server. 


Fortifying Your Defenses: Ransomware Protection Strategies in the Age of Black Basta

What sets Black Basta apart is its disciplined methodology. Initial access is typically gained through phishing campaigns, vulnerable public-facing applications, compromised credentials or malicious software packages. Once inside, the group moves laterally through the network, escalates privileges, exfiltrates data and deploys ransomware at the most damaging points. Bottom line: Groups like Black Basta aren’t using zero-day exploits. They’re taking advantage of known gaps defenders too often leave open. ... Start with multi-factor authentication across remote access points and cloud applications. Audit user privileges regularly and apply the principle of least privilege. Consider passwordless authentication to eliminate commonly abused credentials. ... Unpatched internet-facing systems are among the most frequent entry points. Prioritize known exploited vulnerabilities, automate updates when possible and scan frequently. ... Secure VPNs with MFA. Where feasible, move to stronger architectures like virtual desktop infrastructure or zero trust network access, which assumes compromise is always a possibility. ... Phishing is still a top tactic. Go beyond spam filters. Use behavioral analysis tools and conduct regular training to help users spot suspicious emails. External email banners can provide a simple warning signal.


AI Emotional Dependency and the Quiet Erosion of Democratic Life

Byung-Chul Han’s The Expulsion of the Other is particularly instructive here. He argues that neoliberal societies are increasingly allergic to otherness: what is strange, challenging, or unfamiliar. Emotionally responsive AI companions embody this tendency. They reflect a sanitized version of the self, avoiding friction and reinforcing existing preferences. The user is never contradicted, never confronted. Over time, this may diminish one’s capacity for engaging with real difference; precisely the kind of engagement required for democracy to flourish. In addition, Han’s Psychopolitics offers a crucial lens through which to understand this transformation. He argues that power in the digital age no longer represses individuals but instead exploits their freedom, leading people to voluntarily submit to control through mechanisms of self-optimization, emotional exposure, and constant engagement. ... As behavioral psychologist BJ Fogg has shown, digital systems are designed to shape behavior. When these persuasive technologies take the form of emotionally intelligent agents, they begin to shape how we feel, what we believe, and whom we turn to for support. The result is a reconfiguration of subjectivity: users become emotionally aligned with machines, while withdrawing from the messy, imperfect human community.

Read more here ...
arief chandra

Import Export Specialist di PT. JAYA SAMPOERNA EXPRESS

6d

Salam kenal Bpk dan Ibu yg kami hormati, ijinkan promo kami dari PT. Jaya Sampoerna Express mengenalkan Company kami dibawah ini 🙏🏻 Kepada Yth, To : Seluruh Relasi Purchasing Import-Export And Domestic Di, Tempat. Perihal: Penjelasan Rinkas Kami PT.Jaya Sampoerna siap membantu Bapak dan Ibu untuk pengurusan Custom Clearance All In Service ( borongan ) dengan didukung tim yang solid untuk proses custom tersebut serta kami juga memiliki Kuota Import untuk berbagai jenis barang yang mendapat batasan import oleh negara. Kami siap bantu pengurusan pengiriman Door to Door dari berbagai negara baik dari Asia dan Eropa. Jika memerlukan informasi lebih lanjut silahkan hub: PT.JAYA SAMPOERNA EXPRESS Best Regards ARIEF CHANDRA HP/WA: 0812 1276 6430 Telepon: 021 84343674 Gmail: ariefchandra.import@gmail.com Head Office: CIBUBUR TIMES SQIUARE BLOK B4/17 Jl.Altenatif Cibubur Km3 Jati Sampurna Bakasi 17453 Indonesia Salam Logistics🙏🏻

To view or add a comment, sign in

More articles by Kannan Subbiah

  • May 14, 2025

    3 Stages of Building Self-Healing IT Systems With Multiagent AI Multiagent AI systems can allow significant…

  • May 13, 2025

    How to Move from Manual to Automated to Autonomous Testing As great as test automation is, it would be a mistake to put…

  • May 12, 2025

    The rise of vCISO as a viable cybersecurity career path Companies that don’t have the means to hire a full-time CISO…

  • May 11, 2025

    The Human-Centric Approach To Digital Transformation Involving employees from the beginning of the transformation…

  • May 10, 2025

    Building blocks – what’s required for my business to be SECURE? Zero Trust Architecture involves a set of rules that…

  • May 09, 2025

    The CIO Role Is Expanding -- And So Are the Risks of Getting It Wrong “We are seeing an increased focus of…

  • May 07, 2025

    Real-world use cases for agentic AI There’s a wealth of public code bases on which models can be trained. And larger…

  • May 06, 2025

    A Primer for CTOs: Taming Technical Debt Taking a head-on approach is the most effective way to address technical debt,…

  • May 05, 2025

    How CISOs can talk cybersecurity so it makes sense to executives “With complex technical topics and evolving threats to…

  • May 03, 2025

    Why agentic AI is the next wave of innovation AI agents have become integral to modern enterprises, not just enhancing…

Insights from the community

Others also viewed

Explore topics