Aggregator
What You Don’t Log Will Hurt You – FireTail Blog
Aug 28, 2025 - Lina Romero - APIs have become the most targeted attack surface in enterprise environments, and AI (particularly agentic AI) is making it even harder to protect those critical connections. But one of the most often overlooked and misunderstood aspects of a strong AI and API security posture is logging.Last week, FireTail CEO Jeremy Snyder sat down with John Tobin of Virtual Guardian to discuss the issue in depth, using John’s extensive experience with API logging as a jumping off point. John Tobin has an extensive API security and management background and now heads product and service innovation for the Virtual Guardian.Drawing from his years of helping companies reduce risk and prevent breaches, John shared meaningful insights, case studies where logging both did and could have prevented breaches, and a breakdown of the 5 W’s of audit logging:What: request details, identifiers, and identity typeWhen: timestamp of when the request occurredWhere: IP address, site landed on, and downstream detailsWhy: details about the response and what went wrongWho: identity details and additional informationJeremy layered in his knowledge of AI security, explaining the complications introduced by agentic AI and how to build on knowledge of API security and apply it to AI as well, unifying logging into a single detection workflow for full observability into an organization’s landscape. Watch their full discussion below for more details:Key takeaways from the webinar include:What to log at the API layer for optimal securityLessons from the frontlines of API loggingHow to identify AI-generated traffic on APIsWhat patterns signal potential threatsWhere AI and API observability convergeFrom logging to action: steps you can take today We’ve said it before and we’ll say it again- documentation is king. Without logging, you can’t observe or understand your cyber environment and if you can’t see it, you can’t secure it. Don’t be like the organizations in John’s counter-examples. Act today!FireTail is a great tool for giving you full, centralized audit logs and the observability you need to take control of your AI and API logging. Book a demo now...
The post What You Don’t Log Will Hurt You – FireTail Blog appeared first on Security Boulevard.
再添荣誉 | 锦行科技入选2025中国网络安全企业100强!
美国兰德公司分析美军网络部队战备挑战并提出应对方案
瑞典全国约200个城市居民敏感数据泄露
2025 KCTF 第七题战况 | 共有14支战队成功破解此题
首个AI 驱动勒索软件 PromptLock 瞄准 Windows、Linux 和 macOS
初识白盒AES-含具体实操案例
预售中,别再错过!车联网安全赛道爆发,这门实战课帮你抢占先机
Security Leaders are Rethinking Their Cyber Risk Strategies, New Research from Tenable and Enterprise Strategy Group Shows
Get a firsthand look at how 400 security and IT leaders are tackling today’s cyber risk challenges in this latest study from Tenable and Enterprise Strategy Group.
From budget allocation and prioritization methods to team structure, organizations are fundamentally rethinking how they manage cyber risk.
Why? Because threats, exposures and assets are multiplying at a pace that traditional methods simply can't match, leaving organizations exposed to growing risk.
Tenable partnered with Enterprise Strategy Group on a new research study, “The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management,” to uncover the real-world challenges security teams face in reducing cyber risk in the modern era.
This study surveyed 400 IT and cybersecurity leaders across North America to uncover the biggest challenges, and the most promising opportunities, in today's threat and exposure management landscape.
The bottom line: The old playbook no longer works. It's time to shift from reactive, siloed efforts to a more unified, proactive approach that delivers real, measurable risk reduction.
According to the report, “Organizations are seeking threat and exposure management tools that enhance their prioritization and risk reduction capabilities through automated remediation and deeper analysis. What matters most to security teams is fixing the most important issues first and doing it as quickly as possible at scale.”
“Organizations are seeking threat and exposure management tools that enhance their prioritization and risk reduction capabilities through automated remediation and deeper analysis. What matters most to security teams is fixing the most important issues first and doing it as quickly as possible at scale.”
— The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management, Enterprise Strategy Group, August 2025
Key findings Cyber risk reduction is harder than everNearly three-quarters of organizations (71%) say reducing risk is as hard or harder than it was two years ago, driven by cloud complexity (45%), manual processes (40%) and disconnected tools (40%).
Source: Enterprise Strategy Group, now part of Omdia, Research Report, The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management, July 2025 Crucial context is overlookedNearly half of organizations still rely on basic exploitability (26%) and severity scores (21%), neglecting business context and asset-specific data, which leads to inefficient prioritization and higher risk exposure.
Organizations are shifting their focus from simply finding weaknesses to effectively remediating them. Success is now measured by incidents prevented (59%), vulnerabilities eliminated (55%) and reduction in total risk (51%), demanding platforms that drive effective risk reduction.
Source: Enterprise Strategy Group, now part of Omdia, Research Report, The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management, July 2025 Exposure management budgets are growingOrganizations recognize the growing difficulty of risk reduction and are allocating more budget to tackle the challenge head-on. The vast majority of organizations (88%) are increasing their exposure management budgets year over year, with 59% noting a slight increase and 29% reporting significant increases.
Source: Enterprise Strategy Group, now part of Omdia, Research Report, The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management, July 2025 Organizational silos create frictionOrganizational silos create significant friction, with 27% of respondents citing the use of different tools by different teams as the primary challenge to effective collaboration. Responsibility for exposure management is often fragmented, falling to the general IT operations team (76%) more often than a dedicated vulnerability or exposure management team (41%).
Source: Enterprise Strategy Group, now part of Omdia, Research Report, The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management, July 2025 Get the full storyDownload “The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management” for a deeper look at the challenges your peers are facing, and the future vision they’re building as they move from siloed, manual processes to a unified, automated exposure management program.
The post Security Leaders are Rethinking Their Cyber Risk Strategies, New Research from Tenable and Enterprise Strategy Group Shows appeared first on Security Boulevard.
Chinese Tech Firms Linked to Salt Typhoon Espionage Campaigns
Security Leaders are Rethinking Their Cyber Risk Strategies, New Research from Tenable and Enterprise Strategy Group Shows
Get a firsthand look at how 400 security and IT leaders are tackling today’s cyber risk challenges in this latest study from Tenable and Enterprise Strategy Group.
From budget allocation and prioritization methods to team structure, organizations are fundamentally rethinking how they manage cyber risk.
Why? Because threats, exposures and assets are multiplying at a pace that traditional methods simply can't match, leaving organizations exposed to growing risk.
Tenable partnered with Enterprise Strategy Group on a new research study, “The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management,” to uncover the real-world challenges security teams face in reducing cyber risk in the modern era.
This study surveyed 400 IT and cybersecurity leaders across North America to uncover the biggest challenges, and the most promising opportunities, in today's threat and exposure management landscape.
The bottom line: The old playbook no longer works. It's time to shift from reactive, siloed efforts to a more unified, proactive approach that delivers real, measurable risk reduction.
According to the report, “Organizations are seeking threat and exposure management tools that enhance their prioritization and risk reduction capabilities through automated remediation and deeper analysis. What matters most to security teams is fixing the most important issues first and doing it as quickly as possible at scale.”
“Organizations are seeking threat and exposure management tools that enhance their prioritization and risk reduction capabilities through automated remediation and deeper analysis. What matters most to security teams is fixing the most important issues first and doing it as quickly as possible at scale.”
— The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management, Enterprise Strategy Group, August 2025
Key findingsCyber risk reduction is harder than everNearly three-quarters of organizations (71%) say reducing risk is as hard or harder than it was two years ago, driven by cloud complexity (45%), manual processes (40%) and disconnected tools (40%).
Source: Enterprise Strategy Group, now part of Omdia, Research Report, The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management, July 2025 Crucial context is overlookedNearly half of organizations still rely on basic exploitability (26%) and severity scores (21%), neglecting business context and asset-specific data, which leads to inefficient prioritization and higher risk exposure.
Organizations are shifting their focus from simply finding weaknesses to effectively remediating them. Success is now measured by incidents prevented (59%), vulnerabilities eliminated (55%) and reduction in total risk (51%), demanding platforms that drive effective risk reduction.
Source: Enterprise Strategy Group, now part of Omdia, Research Report, The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management, July 2025 Exposure management budgets are growingOrganizations recognize the growing difficulty of risk reduction and are allocating more budget to tackle the challenge head-on. The vast majority of organizations (88%) are increasing their exposure management budgets year over year, with 59% noting a slight increase and 29% reporting significant increases.
Source: Enterprise Strategy Group, now part of Omdia, Research Report, The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management, July 2025 Organizational silos create frictionOrganizational silos create significant friction, with 27% of respondents citing the use of different tools by different teams as the primary challenge to effective collaboration. Responsibility for exposure management is often fragmented, falling to the general IT operations team (76%) more often than a dedicated vulnerability or exposure management team (41%).
Source: Enterprise Strategy Group, now part of Omdia, Research Report, The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management, July 2025 Get the full storyDownload “The Evolution of Risk Reduction: Contextual Analysis and Automated Remediation in Threat and Exposure Management” for a deeper look at the challenges your peers are facing, and the future vision they’re building as they move from siloed, manual processes to a unified, automated exposure management program.
День X для корпоративной связи: 0-day парализовала планету — тысячи компаний не могут дозвониться
当数字世界的“万能钥匙”被滥用,谁来守护核心资产?火山的 MCP 安全授权新范式
再升3位 默安科技连续入选《2025年中国网络安全市场100强》榜单
Security Configuration Management: From Static Baselines to Continuous Protection
Security configuration management ensures systems remain securely configured by detecting and correcting drift. Traditional baseline checks fall short in modern, fast-changing environments. A continuous SCM approach enables proactive detection, intelligent change control, and audit-ready reporting, helping organizations reduce risk and maintain compliance at scale. Security configuration management (SCM) ensures secure settings across systems, network devices, … Continued