The Challenges of AI Security Begin With Defining It Permalink
Security for AI is the Next Big Thing! Too bad no one knows what any of that really means.
Security for AI is the Next Big Thing! Too bad no one knows what any of that really means.
The tantalizing promise of true artificial intelligence, or at least decent machine learning, has whipped into a gallop large organizations not built for spe...
Business users are building Copilots and GPTs with enterprise data. What can security teams do about it?
Enterprises need to create a secure structure for tracking, assessing, and monitoring their growing stable of AI business apps.
Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...
A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
AI-generated code promises quicker fixes for vulnerabilities, but ultimately developers and security teams must balance competing interests.
With the introduction of generative AI, even more business users are going to create low-code/no-code applications. Prepare to protect them.
How can we build security back into software development in a low-code/no-code environment?
No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.
What’s scarier than keeping all of your passwords in one place and having that place raided by hackers? Maybe reusing insecure passwords.
Here’s how a security team can present itself to citizen developers as a valuable resource rather than a bureaucratic roadblock.
Large vendors are commoditizing capabilities that claim to provide absolute security guarantees backed up by formal verification. How significant are these p...
Here’s what that means about our current state as an industry, and why we should be happy about it.
Security teams that embrace low-code/no-code can change the security mindset of business users.
Many enterprise applications are built outside of IT, but we still treat the platforms they’re built with as point solutions.
Low/no-code tools allow citizen developers to design creative solutions to address immediate problems, but without sufficient training and oversight, the tec...
How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
To see why low-code/no-code is inevitable, we need to first understand how it finds its way into the enterprise.
IT departments must account for the business impact and security risks such applications introduce.
The danger of anyone being able to spin up new applications is that few are thinking about security. Here’s why everyone is responsible for the security of l...
How can we build security back into software development in a low-code/no-code environment?
No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.
Here’s how a security team can present itself to citizen developers as a valuable resource rather than a bureaucratic roadblock.
Here’s what that means about our current state as an industry, and why we should be happy about it.
Security teams that embrace low-code/no-code can change the security mindset of business users.
This document is the vulnerability disclosure report once the vulnerability was discovered.
In the middle of March 2022, Zenity research team discovered a sandbox-escape vulnerability in Code by Zapier, a service used by Zapier to execute custom cod...
Low/no-code tools allow citizen developers to design creative solutions to address immediate problems, but without sufficient training and oversight, the tec...
How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Zenity research team discovers a vulnerability in Zapier’s storage solution that exposes sensitive customer data. Despite Zapier’s efforts to mitigate the is...
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
Despite Microsoft’s efforts to enhance security features, the Zenity research team found that Power Pages is still prone to security risks due to misconfigur...
To see why low-code/no-code is inevitable, we need to first understand how it finds its way into the enterprise.
IT departments must account for the business impact and security risks such applications introduce.
The danger of anyone being able to spin up new applications is that few are thinking about security. Here’s why everyone is responsible for the security of l...
In late August 2021, a data leak exposed 38 million private records via Microsoft’s Power Apps portals. Discovered by UpGuard, this misconfiguration is one o...
Seven significant security risks in low-code development, such as insecure authentication and data leakage plus practical advice for mitigating these vulnera...
Clear examples of why low-code / no-code is so cool.
Last year, Microsoft’s Detection and Response Team (DART) published the timeline of an attack which leveraged Power Platform, Microsoft’s low-code platform. ...
Low-code application development provides a solution for a wide range of business needs, from business applications through process automation and integratio...
A login, a PA trial license, and some good old hacking are all that’s needed to nab SQL databases
How can we build security back into software development in a low-code/no-code environment?
No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.
Here’s what that means about our current state as an industry, and why we should be happy about it.
Many enterprise applications are built outside of IT, but we still treat the platforms they’re built with as point solutions.
This document is the vulnerability disclosure report once the vulnerability was discovered.
In the middle of March 2022, Zenity research team discovered a sandbox-escape vulnerability in Code by Zapier, a service used by Zapier to execute custom cod...
How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Zenity research team discovers a vulnerability in Zapier’s storage solution that exposes sensitive customer data. Despite Zapier’s efforts to mitigate the is...
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
Despite Microsoft’s efforts to enhance security features, the Zenity research team found that Power Pages is still prone to security risks due to misconfigur...
IT departments must account for the business impact and security risks such applications introduce.
The danger of anyone being able to spin up new applications is that few are thinking about security. Here’s why everyone is responsible for the security of l...
In late August 2021, a data leak exposed 38 million private records via Microsoft’s Power Apps portals. Discovered by UpGuard, this misconfiguration is one o...
Seven significant security risks in low-code development, such as insecure authentication and data leakage plus practical advice for mitigating these vulnera...
Clear examples of why low-code / no-code is so cool.
Last year, Microsoft’s Detection and Response Team (DART) published the timeline of an attack which leveraged Power Platform, Microsoft’s low-code platform. ...
Low-code application development provides a solution for a wide range of business needs, from business applications through process automation and integratio...
Allowing a copilot to search the web at will is extremely dangerous. Here are two somewhat-understood vulnerabilities and how to mitigate them. Note: this is...
Last August I gave a talk at BlackHat USA titled All You Need Is Guest. In it, I showed how simple guest access to EntraID could be escalated into full contr...
This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.
Microsoft Copilot Studio allows users to quickly build enterprise Copilots on top of their business data. Every enterprise user can now plug enterprise data ...
Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...
A login, a PA trial license, and some good old hacking are all that’s needed to nab SQL databases
A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
This document is the vulnerability disclosure report once the vulnerability was discovered.
In the middle of March 2022, Zenity research team discovered a sandbox-escape vulnerability in Code by Zapier, a service used by Zapier to execute custom cod...
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.
How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Zenity research team discovers a vulnerability in Zapier’s storage solution that exposes sensitive customer data. Despite Zapier’s efforts to mitigate the is...
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
Despite Microsoft’s efforts to enhance security features, the Zenity research team found that Power Pages is still prone to security risks due to misconfigur...
In late August 2021, a data leak exposed 38 million private records via Microsoft’s Power Apps portals. Discovered by UpGuard, this misconfiguration is one o...
Last year, Microsoft’s Detection and Response Team (DART) published the timeline of an attack which leveraged Power Platform, Microsoft’s low-code platform. ...
Allowing a copilot to search the web at will is extremely dangerous. Here are two somewhat-understood vulnerabilities and how to mitigate them. Note: this is...
Last August I gave a talk at BlackHat USA titled All You Need Is Guest. In it, I showed how simple guest access to EntraID could be escalated into full contr...
This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.
Microsoft Copilot Studio allows users to quickly build enterprise Copilots on top of their business data. Every enterprise user can now plug enterprise data ...
A login, a PA trial license, and some good old hacking are all that’s needed to nab SQL databases
A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
This document is the vulnerability disclosure report once the vulnerability was discovered.
In the middle of March 2022, Zenity research team discovered a sandbox-escape vulnerability in Code by Zapier, a service used by Zapier to execute custom cod...
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.
How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Zenity research team discovers a vulnerability in Zapier’s storage solution that exposes sensitive customer data. Despite Zapier’s efforts to mitigate the is...
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
Despite Microsoft’s efforts to enhance security features, the Zenity research team found that Power Pages is still prone to security risks due to misconfigur...
In late August 2021, a data leak exposed 38 million private records via Microsoft’s Power Apps portals. Discovered by UpGuard, this misconfiguration is one o...
Last year, Microsoft’s Detection and Response Team (DART) published the timeline of an attack which leveraged Power Platform, Microsoft’s low-code platform. ...
Allowing a copilot to search the web at will is extremely dangerous. Here are two somewhat-understood vulnerabilities and how to mitigate them. Note: this is...
Last August I gave a talk at BlackHat USA titled All You Need Is Guest. In it, I showed how simple guest access to EntraID could be escalated into full contr...
This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.
Microsoft Copilot Studio allows users to quickly build enterprise Copilots on top of their business data. Every enterprise user can now plug enterprise data ...
Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...
Research as usual
A login, a PA trial license, and some good old hacking are all that’s needed to nab SQL databases
A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.
Despite Microsoft’s efforts to enhance security features, the Zenity research team found that Power Pages is still prone to security risks due to misconfigur...
In late August 2021, a data leak exposed 38 million private records via Microsoft’s Power Apps portals. Discovered by UpGuard, this misconfiguration is one o...
Last year, Microsoft’s Detection and Response Team (DART) published the timeline of an attack which leveraged Power Platform, Microsoft’s low-code platform. ...
Security for AI is the Next Big Thing! Too bad no one knows what any of that really means.
The tantalizing promise of true artificial intelligence, or at least decent machine learning, has whipped into a gallop large organizations not built for spe...
Business users are building Copilots and GPTs with enterprise data. What can security teams do about it?
With the introduction of generative AI, even more business users are going to create low-code/no-code applications. Prepare to protect them.
How can we build security back into software development in a low-code/no-code environment?
No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.
Here’s how a security team can present itself to citizen developers as a valuable resource rather than a bureaucratic roadblock.
Security teams that embrace low-code/no-code can change the security mindset of business users.
Low/no-code tools allow citizen developers to design creative solutions to address immediate problems, but without sufficient training and oversight, the tec...
To see why low-code/no-code is inevitable, we need to first understand how it finds its way into the enterprise.
Clear examples of why low-code / no-code is so cool.
Low-code application development provides a solution for a wide range of business needs, from business applications through process automation and integratio...
Research as usual
AI-generated code promises quicker fixes for vulnerabilities, but ultimately developers and security teams must balance competing interests.
This document is the vulnerability disclosure report once the vulnerability was discovered.
In the middle of March 2022, Zenity research team discovered a sandbox-escape vulnerability in Code by Zapier, a service used by Zapier to execute custom cod...
Low/no-code tools allow citizen developers to design creative solutions to address immediate problems, but without sufficient training and oversight, the tec...
How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
IT departments must account for the business impact and security risks such applications introduce.
The danger of anyone being able to spin up new applications is that few are thinking about security. Here’s why everyone is responsible for the security of l...
In late August 2021, a data leak exposed 38 million private records via Microsoft’s Power Apps portals. Discovered by UpGuard, this misconfiguration is one o...
Seven significant security risks in low-code development, such as insecure authentication and data leakage plus practical advice for mitigating these vulnera...
Allowing a copilot to search the web at will is extremely dangerous. Here are two somewhat-understood vulnerabilities and how to mitigate them. Note: this is...
Security for AI is the Next Big Thing! Too bad no one knows what any of that really means.
As AI continues to capture everyone’s attention, security for AI becomes a popular topic in the market. Security for AI is capturing the media cycle, AI secu...
The tantalizing promise of true artificial intelligence, or at least decent machine learning, has whipped into a gallop large organizations not built for spe...
Microsoft Copilot Studio allows users to quickly build enterprise Copilots on top of their business data. Every enterprise user can now plug enterprise data ...
Business users are building Copilots and GPTs with enterprise data. What can security teams do about it?
Enterprises need to create a secure structure for tracking, assessing, and monitoring their growing stable of AI business apps.
AI-generated code promises quicker fixes for vulnerabilities, but ultimately developers and security teams must balance competing interests.
With the introduction of generative AI, even more business users are going to create low-code/no-code applications. Prepare to protect them.
No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.
Security for AI is the Next Big Thing! Too bad no one knows what any of that really means.
The tantalizing promise of true artificial intelligence, or at least decent machine learning, has whipped into a gallop large organizations not built for spe...
Business users are building Copilots and GPTs with enterprise data. What can security teams do about it?
Enterprises need to create a secure structure for tracking, assessing, and monitoring their growing stable of AI business apps.
How can we build security back into software development in a low-code/no-code environment?
Here’s what that means about our current state as an industry, and why we should be happy about it.
Many enterprise applications are built outside of IT, but we still treat the platforms they’re built with as point solutions.
IT departments must account for the business impact and security risks such applications introduce.
The danger of anyone being able to spin up new applications is that few are thinking about security. Here’s why everyone is responsible for the security of l...
Last August I gave a talk at BlackHat USA titled All You Need Is Guest. In it, I showed how simple guest access to EntraID could be escalated into full contr...
This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.
Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...
This document is the vulnerability disclosure report once the vulnerability was discovered.
In the middle of March 2022, Zenity research team discovered a sandbox-escape vulnerability in Code by Zapier, a service used by Zapier to execute custom cod...
Despite Microsoft’s efforts to enhance security features, the Zenity research team found that Power Pages is still prone to security risks due to misconfigur...
In late August 2021, a data leak exposed 38 million private records via Microsoft’s Power Apps portals. Discovered by UpGuard, this misconfiguration is one o...
Last year, Microsoft’s Detection and Response Team (DART) published the timeline of an attack which leveraged Power Platform, Microsoft’s low-code platform. ...
Security for AI is the Next Big Thing! Too bad no one knows what any of that really means.
The tantalizing promise of true artificial intelligence, or at least decent machine learning, has whipped into a gallop large organizations not built for spe...
Business users are building Copilots and GPTs with enterprise data. What can security teams do about it?
Enterprises need to create a secure structure for tracking, assessing, and monitoring their growing stable of AI business apps.
Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...
A login, a PA trial license, and some good old hacking are all that’s needed to nab SQL databases
A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.
With the introduction of generative AI, even more business users are going to create low-code/no-code applications. Prepare to protect them.
No-code has lowered the barrier for non-developers to create applications. Artificial intelligence will completely eliminate it.
Here’s how a security team can present itself to citizen developers as a valuable resource rather than a bureaucratic roadblock.
Security teams that embrace low-code/no-code can change the security mindset of business users.
The danger of anyone being able to spin up new applications is that few are thinking about security. Here’s why everyone is responsible for the security of l...
Low-code application development provides a solution for a wide range of business needs, from business applications through process automation and integratio...
What’s scarier than keeping all of your passwords in one place and having that place raided by hackers? Maybe reusing insecure passwords.
Large vendors are commoditizing capabilities that claim to provide absolute security guarantees backed up by formal verification. How significant are these p...
Many enterprise applications are built outside of IT, but we still treat the platforms they’re built with as point solutions.
The danger of anyone being able to spin up new applications is that few are thinking about security. Here’s why everyone is responsible for the security of l...
Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — despite the risks associated with public...
Research as usual
A login, a PA trial license, and some good old hacking are all that’s needed to nab SQL databases
A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Low-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
This document is the vulnerability disclosure report once the vulnerability was discovered.
In the middle of March 2022, Zenity research team discovered a sandbox-escape vulnerability in Code by Zapier, a service used by Zapier to execute custom cod...
Zenity research team discovers a vulnerability in Zapier’s storage solution that exposes sensitive customer data. Despite Zapier’s efforts to mitigate the is...
How can we build security back into software development in a low-code/no-code environment?
Low-code application development provides a solution for a wide range of business needs, from business applications through process automation and integratio...
Here’s what that means about our current state as an industry, and why we should be happy about it.
IT departments must account for the business impact and security risks such applications introduce.
Many enterprise applications are built outside of IT, but we still treat the platforms they’re built with as point solutions.
To see why low-code/no-code is inevitable, we need to first understand how it finds its way into the enterprise.
A login, a PA trial license, and some good old hacking are all that’s needed to nab SQL databases
A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
IT departments must account for the business impact and security risks such applications introduce.
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.
Large vendors are commoditizing capabilities that claim to provide absolute security guarantees backed up by formal verification. How significant are these p...
What’s scarier than keeping all of your passwords in one place and having that place raided by hackers? Maybe reusing insecure passwords.
A login, a PA trial license, and some good old hacking are all that’s needed to nab SQL databases
Assorted links for OWASP Global AppSec DC 2023:
Assorted links for All You Need Is Guest @ RSAC 2024: