Technology

Related News

How test data generators support compliance and data privacy

  • None
  • Published date: 2025-12-16 00:00:00

None

<div class="u-rich-text u-overflow-clip w-richtext" morss_own_score="5.815028901734104" morss_score="90.53131991343498"> <p>Test data generators automate the creation of datasets you can safely use in development, QA, and staging environments. Instead of copying production records—which risks regulatory violations and data breaches—or hand-crafting mock data that misses edge cases, you let a generator produce realistic data that mimics your schema, distributions, and relationships.</p> <p>At a high level, two key approaches are synthetic generation from scratch and de-identification of existing data. Both approaches provide you with a secure substitute for production data in tests while preserving data utility.</p> <h2>Why compliance requires safe test data</h2> <p>Using production data in non-production environments increases privacy and regulatory risk. Test environments often lack the same access controls and audit trails as production. You could unintentionally expose real PII to developers, vendors, or third-party testers.</p> <p>Common compliance concerns include:</p> <ul> <li>GDPR/CCPA violations and fees  </li> <li>Unauthorized parties accessing PII  </li> <li>Data breaches during QA or vendor testing  </li> <li>Reputational damage  </li> </ul> <h2>What is a test data generator?</h2> <p>A test data generator is a tool or service that creates representative datasets for software development and testing. Instead of manually writing SQL INSERT statements or exporting subsets of production tables, you define rules or let the generator infer schema patterns. The tool then produces data that mirrors your database structure, data distributions, and referential integrity.</p> <figure><img decoding="async" src="https://cdn.prod.website-files.com/62e28cf08913e80aefba2c44/6941997902a215aaa9893b57_Fabricate%20screenshot.png"></figure> <p>Test data generators can cover both structured and unstructured data. For structured data, they may generate names, dates, transaction records, and relationships across tables, including consistent primary and foreign keys. For unstructured text—like support tickets or free-form notes—a generator detects sensitive entities, redacts or replaces them with realistic placeholders, and can even synthesize entire documents.</p> <h2>How test data generators protect privacy</h2> <p>When you replace production data with synthetic generated or de-identified data, you reduce the chance of exposing real customer information. Generators enable you to:</p> <ul> <li>Eliminate the need to copy production data into dev or test environments—no more Jira tickets requesting sanitized exports or waiting for data teams to provision test databases.</li> <li>Preserve realism so test cases still surface bugs that only appear in production-shaped data—edge cases, null handling, referential integrity across joins.</li> <li>Speed up provisioning by generating datasets on demand, instead of requesting data exports.  </li> <li>Securely collaborate with offshore or third-party teams <a href="https://www.tonic.ai/guides/pii-data-compliance-checklist">without exposing raw PII</a>—share test databases freely without legal review bottlenecks.</li> <li>Support data-minimization principles under the <a href="https://gdpr-info.eu/">GDPR</a> and <a href="https://oag.ca.gov/privacy/ccpa">CCPA</a> by only creating the data you need for testing—generate just the tables, columns, and rows required for each test scenario.</li> <li>Produce audit-ready processes that trace how test data was generated or masked.</li> </ul> <h2>Key features of test data generators</h2> <p>Here are the core capabilities you should look for when evaluating a test data generator for compliance and data privacy. </p> <h3>Synthetic data generation (both from scratch and from existing data)</h3> <p>Synthetic test data generation creates new, artificial records based on your schema and sample statistics. <a href="https://www.tonic.ai/products/fabricate">Tonic Fabricate</a> offers the industry-leading AI agent for synthetic data generation, the Data Agent, which generates both structured and unstructured data for you based on a schema definition, sample data, or natural language prompts. It maintains foreign-key relationships and relational integrity while generating entire tables without touching real records.</p> <h3>Deterministic data masking</h3> <p>Deterministic data masking, like that offered by <a href="https://www.tonic.ai/products/tonic-structural">Tonic Structural</a>, replaces each sensitive value with a consistent placeholder. For example, every instance of “Alice Smith” becomes “Rebecca Johnson” across your database—in every table, every environment, every generation run. </p> <p>This consistency is critical for testing workflows that depend on cross-table joins or time-series analysis where you need to track the same logical entity across multiple records. This preserves referential integrity and makes debugging easier, since the same input always yields the same output. </p> <h3>Format-preserving encryption</h3> <p>Format-preserving encryption (FPE), also offered within Tonic Structural, encrypts sensitive values like credit card numbers or phone numbers while ensuring the encrypted output maintains the same format as the input (same length and pattern). This means test logic that validates format rules, performs calculations, or checks constraints will still work correctly, while the underlying data remains secure and unreadable without the decryption key.</p> <h3>Maintaining referential integrity</h3> <p>Generated or masked data must respect foreign-key constraints so joins don’t break. A robust generator maps relationships across tables, ensuring parent-child links remain valid after transformation.</p> <h3>Database subsetting</h3> <p><a href="https://www.tonic.ai/blog/the-value-of-database-subsetting">Database subsetting</a> extracts a smaller slice of your production schema-—say, 10% of rows—so you can work with a more manageable volume. The challenge: maintaining referential integrity when you subset. If you extract 10% of users, you also need their related orders, payments, and support tickets—which may reference other tables. </p> <p>Tonic Structural’s patented subsetter automatically traverses foreign key relationships to pull connected records, ensuring your subset remains internally consistent and usable for testing. Combined with masking or synthesis, subsetting reduces data size and surface area while still covering critical paths.</p> <h2>How Tonic.ai enables secure test data generation</h2> <p>Tonic.ai helps you meet compliance requirements while maintaining development velocity. Tonic Structural de-identifies existing databases while preserving referential integrity, Tonic Fabricate generates hyper-realistic synthetic datasets from scratch for any domain in a matter of minutes, and Tonic Textual sanitizes PII in unstructured text fields for secure AI model training. </p> <p>Integrate all three into your development workflows to automatically provision compliant, production-like test data for every build.</p> <p>Ready to automate compliant test data generation? <a href="https://www.tonic.ai/book-a-demo">Book a demo</a> to see how Tonic.ai helps engineering teams eliminate production data from test environments while maintaining data quality and development velocity.</p> </div><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/12/how-test-data-generators-support-compliance-and-data-privacy/" data-a2a-title="How test data generators support compliance and data privacy"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fhow-test-data-generators-support-compliance-and-data-privacy%2F&amp;linkname=How%20test%20data%20generators%20support%20compliance%20and%20data%20privacy" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fhow-test-data-generators-support-compliance-and-data-privacy%2F&amp;linkname=How%20test%20data%20generators%20support%20compliance%20and%20data%20privacy" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fhow-test-data-generators-support-compliance-and-data-privacy%2F&amp;linkname=How%20test%20data%20generators%20support%20compliance%20and%20data%20privacy" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fhow-test-data-generators-support-compliance-and-data-privacy%2F&amp;linkname=How%20test%20data%20generators%20support%20compliance%20and%20data%20privacy" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fhow-test-data-generators-support-compliance-and-data-privacy%2F&amp;linkname=How%20test%20data%20generators%20support%20compliance%20and%20data%20privacy" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.tonic.ai">Expert Insights on Synthetic Data from the Tonic.ai Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Expert Insights on Synthetic Data from the Tonic.ai Blog">Expert Insights on Synthetic Data from the Tonic.ai Blog</a>. Read the original post at: <a href="https://www.tonic.ai/blog/how-test-data-generators-support-compliance">https://www.tonic.ai/blog/how-test-data-generators-support-compliance</a> </p>

What You Should Know Before Migrating Your App to Ruby on Rails: Key Insights for a Smooth Transition

  • None
  • Published date: 2025-12-16 00:00:00

None

<p>Migrating your app to ROR can open new options for speed, clearer structure, and long-term growth. Before you make that move, you need a clear picture of how the framework works and what a safe Rails app migration involves. Planning both the technical work and the project steps helps protect data, keep performance steady, and avoid long outages.</p><p>Moving to Ruby on Rails gives you a structured way to upgrade or reshape your system as requirements change. The framework supports step-by-step database changes, consistent code style, and architectures that handle growing traffic. You still need clear goals, version control, and a solid testing plan before you start. Partners with hands-on ROR experience can guide the work and reduce costly mistakes.</p><p>Good preparation makes the migration more predictable. That means reviewing your schema, testing migration tools on samples, and checking the deployment setup before any live cutover. With a careful plan, your Ruby on Rails migration can keep performance stable and make future changes easier.</p><p><strong>Key Takeaways</strong></p><ul> <li> <p>Understand what a Ruby on Rails migration involves before you begin.</p> </li> <li> <p>Plan and test each step to avoid service disruptions.</p> </li> <li> <p>Rely on clear processes and experienced support to keep the migration on track.</p> </li> </ul><h2>Essential Considerations Before Migrating Your App to Ruby on Rails</h2><p>You need a clear view of your current system before you move to ROR. Knowing your dependencies, database limits, and code quality helps you spot risks early and avoid surprises during migration.</p><h3>Assessing Current Architecture and Dependencies</h3><p><img decoding="async" src="https://cdn.pseo.one/6853a4a8a2796a91bb994a76/687e6d61f6fe799d28851eff/topics/694141e76cfd21711bf7a4c2/b67dbf44-0f29-4eab-b2f6-5bd731c78b67.webp" alt=""></p><p>Start by looking at how your current app handles logic, services, and data flow. Ruby on Rails follows a model-view-controller (MVC) pattern, so your application needs to fit or move toward this structure. Review how requests move through the app, how responses are built, and where external services come into play.</p><p>Next, examine external libraries and dependencies. Tools like Gemfile.lock and the bundle outdated command help track Ruby gems and check if they work with current ROR versions. Pay attention to gems that are no longer maintained or that changed their API, because they can break important features.</p><p>Write down all dependencies and their versions. This record guides you when you rebuild the environment in Rails. Some background job tools, caching layers, or asset pipelines may behave differently, so plan where Rails features such as Active Job or Active Storage will replace or wrap existing tools.</p><h3>Evaluating Database Requirements and Compatibility</h3><p>Rails supports PostgreSQL, MySQL, and SQLite, but behavior is not identical between engines. Review tables, indexes, triggers, and stored procedures in your current system to see what carries over cleanly and what needs to change. Handling of JSON types, collation rules, and index strategies can all affect speed and data safety.</p><p>Before a full cutover, run a small trial migration with a sample dataset. This helps uncover type mismatches, broken constraints, and character set issues early. If your system uses complex stored procedures, consider moving part of that logic into Rails models or rake tasks so the codebase is easier to maintain.</p><p>Also review how your current app handles schema changes. Rails uses migration files to track each change in the database. When these files live in your version control system, such as a GitHub repository, the team gets a clear history of every schema update across environments.</p><h3>Planning for Code Refactoring and Feature Updates</h3><p>A move to Rails is a good time to clean old or tangled code. Review the current codebase and decide which areas need refactoring before migration. Removing duplication, splitting large modules, and aligning naming with Rails conventions all make tests easier to write and future changes easier to handle.</p><p>Separate features into two groups: those that must ship with the first Rails release and those that can wait. You may need to adjust API endpoints, background jobs, or authentication flows to match Rails controllers and routes. Focus first on core flows such as login, payments, or main dashboards; handle less important extras after the main release is stable.</p><p>Use Rails generators and scaffolding as a starting point only. Generated models, controllers, and views still need review so they match your domain rules. Schedule regular code reviews during the migration to confirm that both new and refactored parts behave consistently and pass tests.</p><h2>Ensuring Migration Success: Testing, Deployment, and Security</h2><p><img decoding="async" src="https://cdn.pseo.one/6853a4a8a2796a91bb994a76/687e6d61f6fe799d28851eff/topics/694141e76cfd21711bf7a4c2/75aa8d5d-dbed-47ec-b8cd-d93120327815.webp" alt=""></p><p>You need structured tests, repeatable deployments, and secure handling of app data to migrate effectively. In any <a href="https://rubyroidlabs.com/services/ror_development">Ruby on Rails migration</a>, consistent validation, automation, and auditing help keep your ROR setup stable and secure before and after launch.</p><h3>Setting Up Automated Tests and Test Coverage</h3><p>Automated tests help confirm that new Rails code does not break existing behavior. RSpec is a common choice for writing tests for models, controllers, and services. With a solid test suite, you can adjust routing, queries, and background jobs with more confidence.</p><p>Coverage tools such as SimpleCov show how much of the code runs during tests. Aim for good coverage around login, payments, data imports, and any feature that touches sensitive data. Gaps here can hide bugs that only appear under load or with odd inputs.</p><p>Use fake or scrambled data in test environments to protect user privacy. Keep separate settings for test, development, and production. Combine tests with database cleaning tools so each test run starts from a known state. Running tests on each commit or merge keeps bugs from piling up late in the project.</p><h3>Optimizing Deployment with CI/CD and Containerization</h3><p>A clear deployment setup reduces stress on release days. A CI/CD pipeline can run checks, run tests, and deploy Rails code with minimal manual steps. Many Git-based services support this pattern, so every merge into a main branch can trigger a repeatable build and deploy.</p><p>Container tools like Docker help your Rails app behave the same way on developer machines, staging servers, and production. This reduces problems caused by different Ruby versions, system libraries, or build tools. In larger setups, Kubernetes or similar platforms help you run multiple containers, handle rolling updates, and spread load.</p><p>If you host on platforms like Heroku or Render, you can plug CI/CD into their pipelines. Background workers such as Sidekiq can run in separate dynos or services to handle heavy jobs. Roll out changes in stages, watch logs and metrics, and only then send more traffic to the new release.</p><h3>Managing Security, Secrets, and Dependency Auditing</h3><p>Safe handling of secrets is central to a reliable migration. Keep tokens, passwords, and API keys out of the codebase. Use environment variables or secret storage tools instead of hard-coding them in configuration files or commits.</p><p>Run bundler-audit or similar tools to scan gems for known security issues. Remove or update gems with open vulnerabilities. Rubocop can help enforce coding rules that support clear, safe code and make reviews easier.</p><p>Keep your Ruby, Rails version, and native extensions such as FFI patched with current security releases. Rotate credentials regularly and keep permission levels low for each environment. Regular audits of dependencies and periodic code reviews reduce the risk of hidden security gaps and help keep performance steady over time.</p><h2>Conclusion</h2><p>Before migrating your app to Ruby on Rails, make sure you have a clear reason and a written plan. The move can help your team simplify code, speed up feature delivery, and lean on Rails structures for database changes and testing. Each project has its own limits and risks, so decisions should reflect real business needs, not just technology trends.</p><p>Plan each stage in advance: review code and database design, back up data, write and run tests, and prepare a rollback path. Confirm that both your stack and your team are ready for Rails.</p><p>Security and long-term care also matter. Rails receives regular updates that keep projects in step with new Ruby versions and security fixes. Staying current reduces risk and keeps access to new tools in the ecosystem.</p><p>Treat Rails migration as a strategic move that needs planning, testing, and follow-through. Clear goals, skilled support, and careful preparation raise the chances that your move to Rails delivers steady performance with fewer surprises.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/12/what-you-should-know-before-migrating-your-app-to-ruby-on-rails-key-insights-for-a-smooth-transition/" data-a2a-title="What You Should Know Before Migrating Your App to Ruby on Rails: Key Insights for a Smooth Transition"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fwhat-you-should-know-before-migrating-your-app-to-ruby-on-rails-key-insights-for-a-smooth-transition%2F&amp;linkname=What%20You%20Should%20Know%20Before%20Migrating%20Your%20App%20to%20Ruby%20on%20Rails%3A%20Key%20Insights%20for%20a%20Smooth%20Transition" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fwhat-you-should-know-before-migrating-your-app-to-ruby-on-rails-key-insights-for-a-smooth-transition%2F&amp;linkname=What%20You%20Should%20Know%20Before%20Migrating%20Your%20App%20to%20Ruby%20on%20Rails%3A%20Key%20Insights%20for%20a%20Smooth%20Transition" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fwhat-you-should-know-before-migrating-your-app-to-ruby-on-rails-key-insights-for-a-smooth-transition%2F&amp;linkname=What%20You%20Should%20Know%20Before%20Migrating%20Your%20App%20to%20Ruby%20on%20Rails%3A%20Key%20Insights%20for%20a%20Smooth%20Transition" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fwhat-you-should-know-before-migrating-your-app-to-ruby-on-rails-key-insights-for-a-smooth-transition%2F&amp;linkname=What%20You%20Should%20Know%20Before%20Migrating%20Your%20App%20to%20Ruby%20on%20Rails%3A%20Key%20Insights%20for%20a%20Smooth%20Transition" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fwhat-you-should-know-before-migrating-your-app-to-ruby-on-rails-key-insights-for-a-smooth-transition%2F&amp;linkname=What%20You%20Should%20Know%20Before%20Migrating%20Your%20App%20to%20Ruby%20on%20Rails%3A%20Key%20Insights%20for%20a%20Smooth%20Transition" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://ssojet.com/blog">SSOJet - Enterprise SSO &amp;amp; Identity Solutions</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by SSOJet - Enterprise SSO &amp; Identity Solutions">SSOJet - Enterprise SSO &amp; Identity Solutions</a>. Read the original post at: <a href="https://ssojet.com/blog/migrating-app-to-ruby-on-rails-guide">https://ssojet.com/blog/migrating-app-to-ruby-on-rails-guide</a> </p>

SoundCloud Confirms Security Incident

  • None
  • Published date: 2025-12-16 00:00:00

None

<p>SoundCloud confirmed today that it experienced a security incident involving unauthorized access to a supporting internal system, resulting in the exposure of certain user data. The company said the incident affected approximately 20 percent of its users and involved email addresses along with information already visible on public SoundCloud profiles. Passwords and financial information were not accessed, according to SoundCloud.</p><p>The company disclosed the issue after detecting suspicious activity tied to what it described as an “ancillary service dashboard.” SoundCloud said it contained the activity, engaged external cybersecurity experts to support the investigation, and implemented additional security measures. Following the containment effort, SoundCloud also experienced denial-of-service attacks that caused temporary disruption to web access for some users.</p><div class="wp-block-image"> <figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="740" height="389" src="https://www.centraleyes.com/wp-content/uploads/2025/12/soundcloud-incident.png" alt="" class="wp-image-34887" srcset="https://www.centraleyes.com/wp-content/uploads/2025/12/soundcloud-incident.png 740w, https://www.centraleyes.com/wp-content/uploads/2025/12/soundcloud-incident-300x158.png 300w" sizes="(max-width: 740px) 100vw, 740px"></figure> </div><h2 class="wp-block-heading">What Data Was Exposed</h2><p>SoundCloud has been specific about the scope of data involved.</p><p>According to the company, the exposed data consisted of:</p><ul class="wp-block-list"> <li>User email addresses</li> <li>Information already available on public SoundCloud profiles</li> </ul><p>SoundCloud stated that passwords, payment details, and other sensitive account credentials were not accessed. While the company did not publish an exact user count, multiple reports note that 20 percent of SoundCloud’s user base could translate into a significant number of accounts, given the platform’s global scale.</p><h2 class="wp-block-heading">How The Incident Occurred</h2><p>SoundCloud has not described the event as a breach of its main consumer platform. Instead, the company says the unauthorized activity was detected in a secondary internal system used to support operations. These types of systems typically include administrative dashboards or service tools that have access to user data but are not directly exposed to end users.</p><p>Once the activity was identified, SoundCloud says it took steps to contain access and began an investigation with third-party security specialists. Shortly afterward, the company experienced denial-of-service attacks that intermittently affected web availability. SoundCloud indicated these attacks were separate from the initial unauthorized access but occurred during the same response window.</p><p>Some users also reported being blocked from accessing SoundCloud while using VPN services. The company said those access issues were related to security configuration changes made during remediation and are being addressed.</p><h2 class="wp-block-heading">Was This A Ransomware Or an Extortion Attack?</h2><p>SoundCloud has not publicly attributed the incident to a specific threat actor. While some reporting has referenced claims circulating online about possible extortion activity, SoundCloud has not confirmed those claims in its disclosure. At this stage, attribution remains unverified, and the company has focused its communications on confirmed facts rather than speculation.</p><h2 class="wp-block-heading">What This Means For Users</h2><p>For users, the immediate impact is tied to the exposure of email addresses combined with publicly visible profile information. While this does not provide direct access to SoundCloud accounts, it does increase the likelihood of targeted phishing attempts that reference SoundCloud activity, creator accounts, or platform notifications.</p><p>SoundCloud has not required password resets and has said it believes unauthorized access to its systems has been stopped. The company continues to investigate the incident and monitor for further activity.</p><p>The post <a href="https://www.centraleyes.com/soundcloud-confirms-security-incident/">SoundCloud Confirms Security Incident</a> appeared first on <a href="https://www.centraleyes.com/">Centraleyes</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/12/soundcloud-confirms-security-incident/" data-a2a-title="SoundCloud Confirms Security Incident"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fsoundcloud-confirms-security-incident%2F&amp;linkname=SoundCloud%20Confirms%20Security%20Incident" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fsoundcloud-confirms-security-incident%2F&amp;linkname=SoundCloud%20Confirms%20Security%20Incident" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fsoundcloud-confirms-security-incident%2F&amp;linkname=SoundCloud%20Confirms%20Security%20Incident" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fsoundcloud-confirms-security-incident%2F&amp;linkname=SoundCloud%20Confirms%20Security%20Incident" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fsoundcloud-confirms-security-incident%2F&amp;linkname=SoundCloud%20Confirms%20Security%20Incident" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.centraleyes.com/">Centraleyes</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Rebecca Kappel">Rebecca Kappel</a>. Read the original post at: <a href="https://www.centraleyes.com/soundcloud-confirms-security-incident/">https://www.centraleyes.com/soundcloud-confirms-security-incident/</a> </p>

For the safety of visitors to the digital world

  • The Star Online
  • Published date: 2025-12-15 23:00:00

PETALING JAYA: Strengthened regulations over the online space will protect children's well-being and give families greater confidence in guiding the responsible use of technology, says Women, Family and Community Develop­ment Minister Datuk Seri Nancy Shukri.…

PETALING JAYA: Strengthened regulations over the online space will protect childrens well-being and give families greater confidence in guiding the responsible use of technology, says Women, Family a… [+2880 chars]

Quicken LifeHub product review

  • Angelica Leicht
  • Published date: 2025-12-15 20:34:50

Quicken's LifeHub aims to simplify life and money management in one place — but how well does it actually deliver?

LifeHub lets you store your records and important information in one place, but there are other things to know before signing up.  Bymuratdeniz/Getty Images Keeping track of all facets of your life… [+7124 chars]

A year to choose solidarity over silence

  • José Zamora
  • Published date: 2025-12-15 18:15:33

If 2025 was the year the world woke up to democratic backsliding, 2026 may be the year journalism decides whether it will face that crisis alone or survive it together. Around the globe, authoritarians have learned to use the law to criminalize dissent throug…

If 2025 was the year the world woke up to democratic backsliding, 2026 may be the year journalism decides whether it will face that crisis alone or survive it together. Around the globe, authoritari… [+2160 chars]

The Death—and Rebirth—of Science Diplomacy

  • Jan Lüdert, Martin Wählisch and Tim Flink
  • Published date: 2025-12-15 12:00:26

Once a vehicle for global cooperation, international science has become a high-stakes arena of geopolitical rivalry.

From Dec. 17-18, the Danish presidency of the Council of the European Union and the European Commission will convene the second European Science Diplomacy Conference, bringing 500 top-level policymak… [+11863 chars]

JPMorgan just crossed a dangerous line with Solana that major banks have strictly avoided until now

  • Gino Matos
  • Published date: 2025-12-15 11:35:26

JPMorgan recently issued $50 million in US commercial paper for Galaxy Digital on Solana, with Coinbase and Franklin Templeton as buyers. The bank created an on-chain USCP token, settling both issuance and redemption cash flows in USDC rather than bank wires.…

JPMorgan recently issued $50 million in US commercial paper for Galaxy Digital on Solana, with Coinbase and Franklin Templeton as buyers. The bank created an on-chain USCP token, settling both issua… [+14317 chars]

In cyber security, basics matter, even in 2025

  • Vladimir Jirasek
  • Published date: 2025-12-15 10:21:00

As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026.

What a year 2025 has been: Rich in both cyber events and innovations alike. On the latter, not a week has passed without a mention of innovation in Artificial Intelligence (AI). I am excited about th… [+5578 chars]

Top Android Apps to Block Ads: Enhance Your Mobile Experience

  • Jackson Thorne
  • Published date: 2025-12-15 10:16:00

In the current fast-paced digital globe, advertising have become a great unavoidable component of our own cellular experience. Through invasive pop-ups to be able to autoplay online video ads, these types of disorders can be annoying, slowing down your curren…

In the current fast-paced digital globe, advertising have become a great unavoidable component of our own cellular experience. Through invasive pop-ups to be able to autoplay online video ads, these … [+7565 chars]

MCMC's platform licensing move a good step forward for digital governance, says IGP

  • JUSTIN ZACK
  • Published date: 2025-12-15 07:32:00

PETALING JAYA: The Malaysian Communications and Multimedia Commission's (MCMC) Deeming Provision to consider major digital providers as automatically licensed – and therefore subject to Malaysian laws – from Jan 1 is a step towards strengthening governance of…

PETALING JAYA: The Malaysian Communications and Multimedia Commission's (MCMC) Deeming Provision to consider major digital providers as automatically licensed and therefore subject to Malaysian laws … [+1972 chars]

ServiceNow near deal to buy cybersecurity startup Armis for up to $7 billion: Bloomberg Report

  • Reuters
  • Published date: 2025-12-15 02:31:26

ServiceNow is reportedly in advanced talks to acquire Armis. The cybersecurity startup could be valued at up to $7 billion. Armis, founded in 2016, secures connected devices against cyber threats. Demand for such services is high following recent global cyber…

ServiceNow is in advanced talks to buy Armis, a cybersecurity startup that had been eyeing an initial public offering next year, in a deal that may be valued at as much as $7 billion, Bloomberg News … [+843 chars]

How does Agentic AI affect compliance in the cloud

  • None
  • Published date: 2025-12-15 00:00:00

None

<h2>How Do Non-Human Identities Transform Cloud Security Management?</h2><p>Could your cloud security management strategy be missing a vital component? With cybersecurity evolves, the focus has expanded beyond traditional human operatives to encompass Non-Human Identities (NHIs). Understanding NHIs and their role in modern cloud environments is crucial for industries ranging from financial services to healthcare. This post delves into the intricacies of NHIs, particularly their significance in strengthening cloud compliance and overall security.</p><h3>The Emergence of Non-Human Identities in Cybersecurity</h3><p>Digital is rife with machine-to-machine communications, which necessitate the creation and management of NHIs. These identities mirror human passports but are crafted from encrypted secrets such as tokens or API keys. Within the intricate dance of cloud operations, NHIs serve as the glue binding secure connections between various systems.</p><p>Effective management of these NHIs demands an end-to-end approach. This means more than just managing the identities themselves; it involves overseeing the secrets that authenticate these machine entities and understanding the permissions they are granted. Not only does this proactive management reduce exposure to risks, but it offers a comprehensive understanding of potential vulnerabilities.</p><h3>NHI Management: A Comprehensive Approach to Cloud Security</h3><p>Securing NHIs involves a nuanced approach that spans their entire lifecycle, from discovery and classification to real-time threat detection and remediation. Unlike scattered point solutions, a holistic NHI management platform delivers actionable insights into:</p><ul> <li>Ownership and usage patterns</li> <li>Access permissions</li> <li>Any lurking vulnerabilities</li> </ul><p>Such insights allow cybersecurity teams to implement context-aware strategies that not only bolster cloud compliance but also align with various regulatory requirements across industries.</p><p><a href="https://entro.security/blog/entro-custom-secrets-self-serve-detection-rules-across-code-cloud-and-agents/">Discover how automated detection rules support NHI management</a></p><h3>Benefits of Robust NHI Management for Cloud Compliance</h3><p>The integration of advanced NHI management strategies presents multiple advantages for organizations aiming to enhance their cloud security posture:</p><ul> <li><strong>Reduced Risk:</strong> By identifying and mitigating potential security threats in advance, organizations can significantly lower the chances of breaches and data leaks.</li> <li><strong>Improved Compliance:</strong> Effective NHI management aids in adhering to stringent regulatory requirements, providing audit trails and enforcing policies.</li> <li><strong>Increased Efficiency:</strong> Automation in managing NHIs and their secrets frees up security teams to focus on more strategic initiatives.</li> <li><strong>Enhanced Visibility and Control:</strong> A centralized view into access management simplifies governance tasks.</li> <li><strong>Cost Savings:</strong> Automating secrets rotation and NHI decommissioning helps in reducing operational costs.</li> </ul><p>The application of NHIs is particularly significant when considering the implications of <a href="https://blog.simpletechnology.io/agentic-ai-revolutionizing-federal-law-enforcement-with-intelligent-support" rel="noopener">Agentic AI</a> systems. By ensuring comprehensive visibility and control over NHIs, organizations can effectively adapt AI systems to meet evolving compliance standards.</p><h3>Data-Driven Insights: Bridging Security and R&amp;D Teams</h3><p>The challenge often lies in the disconnect between security and R&amp;D teams, which can create security gaps. Incorporating NHIs into your cybersecurity framework fosters a more integrated approach, bridging this gap and fostering collaboration. Context-driven insights gleaned from NHI management allow for more informed decision-making.</p><p><a href="https://entro.security/blog/secrets-security-in-hybrid-cloud-environments/">Learn about enhancing secrets security in hybrid cloud settings</a></p><h3>Agentic AI and Cloud Compliance: Navigating Regulatory Challenges</h3><p>Where organizations strive to maximize the potential of AI systems, understanding how GDPR applies to Agentic AI systems becomes vital. AI compliance is not merely a regulatory hurdle but a cornerstone of trustworthy cloud operations. NHIs, with their dynamic nature, can play a critical role in ensuring that AI systems remain compliant with existing and emerging regulations.</p><p>By weaving NHIs into the fabric of cloud compliance strategies, industries can confidently harness the power of AI while safeguarding sensitive data. The seamless integration of NHIs enhances operational security and ensures that AI systems can adapt rapidly to changing compliance.</p><p>By examining these aspects, organizations are positioned not only to bolster their compliance frameworks but to enhance their entire cybersecurity posture. This proactive stance on managing NHIs is pivotal for organizations aiming to stay ahead.</p><h3>The Role of Automation in NHI Management</h3><p>Have you explored how automation can transform the management of Non-Human Identities (NHIs)? While we examine the complex cloud security, the integration of automation stands out as a game-changer. Automation enables a seamless synchronization of activities such as secrets rotation, access management, and compliance tracking, thereby enhancing operational efficiency.</p><p>The process of NHI management is multifaceted, involving the continuous monitoring and regulation of machine identities and their associated credentials. Automation reduces the manual effort required, allowing security teams to focus on strategic risk assessments and proactive threat management. This realignment of resources often leads to a reduction in human errors, which are a common cause of security breaches. In turn, this contributes to the resilience of systems against potential attacks.</p><p>Machine learning algorithms, when integrated with NHI management platforms, can provide predictive insights into potential security threats. These insights are drawn from patterns in access logs and behaviors, enabling security teams to anticipate and respond to threats before they materialize. For an organization aiming for a robust security posture, these predictive capabilities added by automation are invaluable.</p><h3>Addressing Common Misconceptions About NHI Security</h3><p>Could misconceptions about NHI security be hindering your organization’s cybersecurity efforts? One prevalent misunderstanding is the assumption that traditional security measures for human users are equally applicable to NHIs. However, machine identities have unique characteristics and operational patterns that require specialized security measures.</p><p>Unlike human identities, NHIs operate continuously across various systems and networks, often with higher privileges than any singular human user. Consequently, securing NHIs demands a distinct approach that considers their dynamic and pervasive nature. Furthermore, NHIs can scale rapidly, especially in environments that utilize microservices architecture or automated DevOps pipelines. This exponential growth makes it difficult for static security frameworks to keep pace, necessitating agile and scalable security solutions.</p><p>Another misconception is that implementing NHI security solutions will disrupt existing workflows. In reality, modern NHI management tools are designed to seamlessly integrate with existing IT infrastructures. This integration allows organizations to maintain their operational tempo while enhancing security measures.</p><h3>Industry-Specific Implications of NHI Management</h3><p>How does NHI management impact diverse industries? Each sector, from financial services to healthcare, has specific regulatory and operational requirements that influence its approach to managing NHIs.</p><p>In <strong>financial services</strong>, the emphasis is on achieving stringent compliance with regulations such as SOX, GLBA, and more. The enhanced visibility into ownership and usage patterns of NHIs facilitates adherence to such mandates by providing comprehensive audit trails and real-time access monitoring. A key resource for professionals seeking to expand their understanding of regulatory impacts is the Celent event series, focusing on technological innovations in finance.</p><p>In <strong>healthcare</strong>, where patient data protection is paramount, NHIs help ensure secure data transfers across systems, maintaining compliance with regulations like HIPAA. By leveraging advanced strategies in NHI management, healthcare providers can enhance data integrity and build patient trust.</p><p>For <strong>DevOps and SOC teams</strong>, managing NHIs efficiently supports the continuous delivery cycle while ensuring security checkpoints are in place. Automation plays a critical role here, enabling seamless integration between security and operational frameworks without slowing down the development process.</p><h3>Best Practices for Implementing NHI Management</h3><p>So, what are the best practices when incorporating NHI management? One crucial step is to establish a complete inventory of all NHIs within your organization. This identification process should extend across all systems, including cloud environments, to ensure no identity is overlooked and potential blind spots are eliminated.</p><p>Another best practice is to adopt a zero-trust architecture. By verifying each identity and their access level, based on its context and request nature, organizations ensure that even trusted NHIs are subject to rigorous scrutiny.</p><p>It is also essential to implement continuous monitoring and auditing of all NHIs to capture real-time data which can then be analyzed for discrepancies or abnormal behavior. This not only supports threat detection but also aids in compliance reporting by maintaining a robust and searchable record of access and activity logs.</p><p>While defending against cyber threats grows increasingly complex, a robust NHI management strategy embodies both a deterrent and a detection mechanism. While you navigate the intricate layers of cybersecurity, understanding the strategic role of NHIs is vital to safeguarding your organization’s data and systems.</p><p>For those interested in further exploring the intersection of AI and organizational strategy, you might find it useful to read about <a href="https://entro.security/blog/cybersecurity-predictions-2025/">future cybersecurity predictions</a> which could better prepare your organization for forthcoming challenges.</p><p>The post <a href="https://entro.security/how-does-agentic-ai-affect-compliance-in-the-cloud/">How does Agentic AI affect compliance in the cloud</a> appeared first on <a href="https://entro.security/">Entro</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/12/how-does-agentic-ai-affect-compliance-in-the-cloud/" data-a2a-title="How does Agentic AI affect compliance in the cloud"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fhow-does-agentic-ai-affect-compliance-in-the-cloud%2F&amp;linkname=How%20does%20Agentic%20AI%20affect%20compliance%20in%20the%20cloud" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fhow-does-agentic-ai-affect-compliance-in-the-cloud%2F&amp;linkname=How%20does%20Agentic%20AI%20affect%20compliance%20in%20the%20cloud" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fhow-does-agentic-ai-affect-compliance-in-the-cloud%2F&amp;linkname=How%20does%20Agentic%20AI%20affect%20compliance%20in%20the%20cloud" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fhow-does-agentic-ai-affect-compliance-in-the-cloud%2F&amp;linkname=How%20does%20Agentic%20AI%20affect%20compliance%20in%20the%20cloud" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fhow-does-agentic-ai-affect-compliance-in-the-cloud%2F&amp;linkname=How%20does%20Agentic%20AI%20affect%20compliance%20in%20the%20cloud" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://entro.security/">Entro</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Alison Mack">Alison Mack</a>. Read the original post at: <a href="https://entro.security/how-does-agentic-ai-affect-compliance-in-the-cloud/">https://entro.security/how-does-agentic-ai-affect-compliance-in-the-cloud/</a> </p>

AWS Report Links Multi-Year Effort to Compromise Cloud Services to Russia

  • Michael Vizard
  • Published date: 2025-12-15 00:00:00

None

<p>Amazon Web Services (AWS) today published a <a href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/">report</a> detailing a series of cyberattacks occurring over multiple years attributable to Russia’s Main Intelligence Directorate (GRU) that were aimed primarily at the energy sector in North America, Europe and the Middle East.</p><p>The latest Amazon Threat Intelligence report concludes that the cyberattacks have been evolving since 2021, based on overlapping infrastructure previously associated with known Sandworm operations observed through AWS telemetry data.</p><p>CJ Moses, CISO for Amazon Integrated Security, said that while AWS has been able to both thwart many of these cyberattacks and remediate any affected instances of misconfigured customer devices running on its EC2 cloud service, cybersecurity teams should assume that similar tactics are being used to compromise other cloud services that organizations might be connected to a misconfigured edge computing platform.</p><p>While thwarting these types of attack should be considered a fundamental capability of any cybersecurity strategy, the fact remains there are still a large number of misconfigured edge computing devices and platforms for malicious actors to exploit, noted Moses.</p><p>AWS was unable to observe how credentials are being captured, but the gap between device compromise and authentication attempts against services suggests passive collection rather than active credential theft, according to the report. Specifically, the report suggests that the targeting of customer network edge devices enables malicious actors to intercept credentials in transit.</p><p>In addition to advising organizations to audit network devices to ensure credentials have not been compromised, AWS is also encouraging cybersecurity teams to analyze logs to identify any instances of reuse of credentials and monitor for authentication attempts from unexpected geographic locations.</p><p>In the case of AWS customers, the cloud service provider is again reminding organizations to implement identity access management (IAM) controls to secure access to cloud services.</p><p>It’s not clear how widely the GRU and any affiliated cybersecurity syndicates have been exploiting this attack vector, but given the number of misconfigured edge computing devices and platforms there are, the extent of the damage is likely to be significant, especially across an energy sector that manages critical infrastructure that is likely to be heavily targeted should any hostilities involving Russia and its allies break out.</p><p>Of course, it’s probable other government agencies around the world are also exploiting similar low-level types of mechanisms to gain access to applications and services. Russia, especially, has a reputation for favoring low cost methods to compromise IT environments, noted Moses.</p><p>The sad truth is that most organizations should assume their IT environments have been compromised using these or other similar types of tactics and techniques. The challenge and the opportunity now is to first determine the degree and the extent of such malicious activity before putting in the controls needed to prevent it from occurring again. Of course, there is no such thing as perfect security but at the same time nor should it be so relatively simple to compromise a modern IT environment.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/12/aws-report-links-multi-year-effort-to-compromise-cloud-services-to-russia/" data-a2a-title="AWS Report Links Multi-Year Effort to Compromise Cloud Services to Russia"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Faws-report-links-multi-year-effort-to-compromise-cloud-services-to-russia%2F&amp;linkname=AWS%20Report%20Links%20Multi-Year%20Effort%20to%20Compromise%20Cloud%20Services%20to%20Russia" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Faws-report-links-multi-year-effort-to-compromise-cloud-services-to-russia%2F&amp;linkname=AWS%20Report%20Links%20Multi-Year%20Effort%20to%20Compromise%20Cloud%20Services%20to%20Russia" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Faws-report-links-multi-year-effort-to-compromise-cloud-services-to-russia%2F&amp;linkname=AWS%20Report%20Links%20Multi-Year%20Effort%20to%20Compromise%20Cloud%20Services%20to%20Russia" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Faws-report-links-multi-year-effort-to-compromise-cloud-services-to-russia%2F&amp;linkname=AWS%20Report%20Links%20Multi-Year%20Effort%20to%20Compromise%20Cloud%20Services%20to%20Russia" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Faws-report-links-multi-year-effort-to-compromise-cloud-services-to-russia%2F&amp;linkname=AWS%20Report%20Links%20Multi-Year%20Effort%20to%20Compromise%20Cloud%20Services%20to%20Russia" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

ServiceNow in Advanced Talks to Acquire Armis for $7 Billion: Reports

  • Jon Swartz
  • Published date: 2025-12-15 00:00:00

None

<p>ServiceNow Inc. is in advanced talks to acquire cybersecurity startup Armis in a deal that could reach $7 billion, its largest ever, according to reports.</p><p>Bloomberg News first reported the discussions over the weekend, noting that an announcement could come within days. However, sources cautioned that the deal could still collapse or attract competing bidders. Neither company has publicly commented on the reports.</p><p>Founded in 2015 by Israeli intelligence veterans, Armis specializes in exposure management and real-time security for connected devices. The company’s Centrix platform provides visibility and risk management across traditional IT equipment, IoT devices, and operational technology systems. Its agentless approach monitors an organization’s entire digital attack surface without requiring software installation on endpoints.</p><p>The potential Armis deal follows ServiceNow’s aggressive acquisition strategy this year. Two weeks ago, the company announced plans to acquire identity security firm Veza for reportedly more than $1 billion, pending regulatory approval. Earlier in 2025, ServiceNow completed a $2.85 billion purchase of Moveworks, an AI-powered enterprise search and assistant technology company.</p><p>ServiceNow CEO Bill McDermott has emphasized that ServiceNow’s AI investments complement rather than threaten traditional business software, focusing on close integration between AI models and existing enterprise systems. The Armis acquisition would strengthen ServiceNow’s Security and Risk portfolios while expanding its capabilities in cloud computing, artificial intelligence (AI), and operational technology security — areas Armis has bolstered through its own strategic acquisitions over the past two years.</p><p>Armis boasts a prestigious client roster spanning healthcare, manufacturing, government, and critical infrastructure sectors. Its customers include NASDAQ, United Airlines, Mondelez International, and the Port of Antwerp-Bruges. More than 40% of Fortune 100 companies reportedly use Armis services, including seven of the top 10.</p><p>Additionally, Armis inked a partnership with KODE Labs and IntelliBuild to provide integrated solutions that combine cybersecurity with operational intelligence for building lifecycle management systems.</p><p>Its roster of customers and partners have helped Armis ramp up sales growth, with annual recurring revenue (ARR) of $300 million, up from $200 million the previous year. The company is targeting $1 billion in ARR as it prepares for a planned 2026 initial public offering (IPO).</p><p>Last month, Armis raised $435 million in pre-IPO funding led by Growth Equity at Goldman Sachs Alternatives, with participation from CapitalG and new investor Evolution Equity Partners. That round valued the company at $6.1 billion. Overall, Armis has raised $1.17 billion across seven funding rounds since 2017, with Insight Partners taking a majority stake in 2020.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/12/servicenow-in-advanced-talks-to-acquire-armis-for-7-billion-reports/" data-a2a-title="ServiceNow in Advanced Talks to Acquire Armis for $7 Billion: Reports"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fservicenow-in-advanced-talks-to-acquire-armis-for-7-billion-reports%2F&amp;linkname=ServiceNow%20in%20Advanced%20Talks%20to%20Acquire%20Armis%20for%20%247%20Billion%3A%20Reports" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fservicenow-in-advanced-talks-to-acquire-armis-for-7-billion-reports%2F&amp;linkname=ServiceNow%20in%20Advanced%20Talks%20to%20Acquire%20Armis%20for%20%247%20Billion%3A%20Reports" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fservicenow-in-advanced-talks-to-acquire-armis-for-7-billion-reports%2F&amp;linkname=ServiceNow%20in%20Advanced%20Talks%20to%20Acquire%20Armis%20for%20%247%20Billion%3A%20Reports" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fservicenow-in-advanced-talks-to-acquire-armis-for-7-billion-reports%2F&amp;linkname=ServiceNow%20in%20Advanced%20Talks%20to%20Acquire%20Armis%20for%20%247%20Billion%3A%20Reports" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fservicenow-in-advanced-talks-to-acquire-armis-for-7-billion-reports%2F&amp;linkname=ServiceNow%20in%20Advanced%20Talks%20to%20Acquire%20Armis%20for%20%247%20Billion%3A%20Reports" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Can Your AI Initiative Count on Your Data Strategy and Governance?

  • None
  • Published date: 2025-12-15 00:00:00

None

<p><a href="https://www.ishir.com/artificial-intelligence.htm" rel="noopener">Launching an AI initiative</a> without a robust data strategy and governance framework is a risk many organizations underestimate. Most AI projects often stall, deliver poor results, or fail to scale because they rest on weak data foundations. At ISHIR, when we partner with mid-market and enterprise CxO leaders, the first question we ask is: do you have your data house in order?</p><h2>Why Data Strategy and Governance Matter for AI</h2><p>1. AI systems depend on data. If data is incomplete, inconsistent, or ungoverned, then even the most advanced models deliver unreliable results. For example, we have observed that lack of governance means “<a href="https://www.ishir.com/blog/121619/how-to-boost-your-workflow-with-ai-top-6-ai-workflow-automation-tools.htm" rel="noopener">AI models</a> generate meaningful insights while minimizing operational and regulatory risks” only when the underlying data is trustworthy.</p><p>2. Governance provides traceability, lineage, and control. Without this, you run compliance risks, lack of explainability, and stakeholder mistrust. We have observed that, “the difference between success and stagnation boils down to governance.”</p><p>3. Strategy aligns data efforts with business objectives. A data strategy designed for AI helps organizations identify the right datasets, define ownership, set quality standards, and make sure the infrastructure supports scale. Success lies in taking “key steps for creating a targeted, achievable, and actionable data strategy, designed to fuel AI success.”</p><h2>Core Components of a Data Strategy &amp; Governance Framework for AI</h2><h4><strong>Data Strategy should include:</strong></h4><ul> <li>A clear inventory of data assets: what exists, where it lives, who owns it.</li> <li>Classification of data according to sensitivity, usage, value, regulatory constraints.</li> <li>Defined business use cases for AI and the data that supports them (not simply “we’ll use AI somewhere”).</li> <li><a href="https://www.ishir.com/modern-data-infrastructure.htm" rel="noopener">Infrastructure architecture</a> and pipeline readiness (e.g., data lakes, cloud/hybrid models, real-time vs batch).</li> <li>Data quality, enrichment and metadata strategy (so data is AI-ready).</li> </ul><h4><strong>Data Governance should cover:</strong></h4><ul> <li>Data policies and standards for data access, usage, classification, retention, refresh cycles.</li> <li>Data lineage and audit trails: knowing how data flows, how it was transformed, how it is used in AI training or inference.</li> <li>Roles and responsibilities: data stewards, owners, governance boards, AI oversight.</li> <li>Monitoring, feedback loops and continuous improvement: governance is not a one-time setup.</li> <li>Compliance and risk mitigation: ensuring data usage meets legal, ethical, regulatory standards.</li> </ul><h2>How to Get Started (The ISHIR Approach)</h2><p><strong>At ISHIR we recommend a four-phase approach to make your AI initiative depend on a solid data foundation:</strong></p><h4><strong>1. Assessment &amp; Rationalization</strong></h4><ul> <li>Inventory your data estate: catalog systems, types, owners, usage.</li> <li>Evaluate current governance maturity: policies, roles, lineage, quality.</li> <li>Map AI use cases to data readiness gaps: what you have, what you need.</li> </ul><h4><strong>2. Define AI Strategy &amp; Roadmap</strong></h4><ul> <li>Select high-impact AI use cases with datasets you are confident about. This allows safe early wins and builds momentum.</li> <li>Define governance models, data quality KPIs, ownership, stewardship.</li> <li>Create a roadmap that aligns data work (cleanup, pipelines, governance) with AI deployments.</li> </ul><h4><strong>3. Implement Data &amp; Governance Foundations</strong></h4><ul> <li>Build or enhance data pipelines, apply metadata, ensure lineage, set up monitoring.</li> <li>Enforce governance controls early, governance needs to be embedded in the storage/data layer rather than bolted on later.</li> <li>Conduct data quality work, standardize formats, tag data, resolve silos.</li> </ul><h4><strong>4. Scale AI with Confidence, Govern Continuously</strong></h4><ul> <li>As AI use cases expand, governance and data strategy remain active, not static artifacts.</li> <li>Monitor AI outcomes, track model performance, trace outputs back to data foundations.</li> <li>Update strategy and governance as new data types, new regulations or new AI methods emerge.</li> </ul><h2>Common Pitfalls to Avoid</h2><ul> <li>Starting AI first and treating data strategy/governance as an afterthought. Data governance is not a nice-to-have; it underpins AI reliability.</li> <li>Ignoring data lineage or metadata, which makes it impossible to explain AI outcomes or comply with audits.</li> <li>Allowing data silos and fragmentation to persist. When data is inconsistent across systems, AI performance suffers.</li> <li>Over-governing to the point of stifling innovation. Governance needs to enable venture into AI, not block it.</li> </ul><h2>Why ISHIR’s Services Matter</h2><p>At ISHIR we bring a blend of <a href="https://www.ishir.com/data-ai-acceleration.htm" rel="noopener">AI and data strategy</a>, design thinking, and technical capability, ideal for organizations that want to scale from early AI pilots to enterprise-wide AI adoption.</p><p><strong>Our offerings relevant here include:</strong></p><ul> <li>Data strategy consulting: helping your team define the “what” and “why” of your data foundation.</li> <li>Data governance enablement: establishing roles, policies, pipelines and governance tooling.</li> <li>AI enablement: layering use-case identification, AI roadmap, data preparations and agile implementations.</li> <li>Change management and organizational alignment: aligning stakeholders, building data literacy, embedding governance culture.</li> </ul><p>If your organization plans to launch or expand an AI initiative, insist on a strong data strategy and governance from day one. Without them, you risk wasted investment, poor outcomes, non-compliance or stalled projects. When data and governance are aligned, AI becomes a lever for transformation. At ISHIR we help leaders build that foundation and move into scaled AI with confidence.</p><div class="ctaThreeWrapper"> <div class="ctaThreeContent"> <div class="ctaThreeConList"> <div class="content"> <h2>Struggling to scale AI because your data foundation is shaky?</h2> <p>Build a governance-first data strategy that makes your AI reliable, compliant, and enterprise-ready.</p> <div class="linkWrapper"><a href="https://www.ishir.com/get-in-touch.htm" rel="noopener">Get Started</a></div> </div> </div> </div> </div><h2>Frequently Asked Questions (FAQs) about Data + AI Strategy</h2><h4><strong>Q: Why does an AI initiative need a data strategy?</strong></h4><p>A. If you treat AI as simply selecting and deploying models, you ignore the data those models depend on. A data strategy ensures you know your assets, quality, formats, usage rights, pipelines and how they map to business outcomes.</p><h4><strong>Q: What is the difference between data governance and AI governance?</strong></h4><p>A. Data governance focuses on ensuring the data is accurate, consistent, traceable and well-managed. AI governance focuses on model ethics, bias, explainability, oversight of model behavior. For AI success you need both, but data governance often comes first.</p><h4><strong>Q: How do you start when your data governance is weak?</strong></h4><p>A. Pick one high-value use case where you are confident about the underlying data. Use this as a pilot to build your governance framework, get buy-in, prove value.</p><h4><strong>Q: What are key metrics or indicators that governance is working?</strong></h4><p>A. Examples include: data quality (completeness, accuracy, freshness), number of datasets catalogued, access audit trails, number of data-related incidents, time to provision data for AI use cases, model performance improvement tied to data actions.</p><h4><strong>Q: How does ISHIR help mid-market and enterprises with this Data + AI strategy?</strong></h4><p>A. ISHIR supports the full lifecycle: from AI strategy definition, governance framework build-out, data pipeline modernization, AI use-case translation, stakeholder engagement, to operationalizing AI at scale.</p><h2>Bringing AI-Ready Data Strategy Closer to You</h2><p>As organizations mature their data strategy and AI governance, many teams look for partners who can support them locally while delivering global-scale expertise. ISHIR brings this blend through its presence across <a href="https://www.ishir.com/software-development-company-dallas.htm" rel="noopener">Dallas</a>, <a href="https://www.ishir.com/software-development-company-austin.htm" rel="noopener">Austin</a>, <a href="https://www.ishir.com/software-development-company-san-antonio.htm" rel="noopener">San Antonio</a>, <a href="https://www.ishir.com/software-development-company-houston.htm" rel="noopener">Houston</a>, and <a href="https://www.ishir.com/new-delhi.htm" rel="noopener">New Delhi</a>, enabling leaders in each region to tap into specialized AI, data engineering, and governance capabilities. Whether you’re tightening compliance, modernizing your data estate, or scaling AI across business units, our geographically distributed teams provide the proximity, speed, and consistency needed to execute with confidence.</p><p>The post <a href="https://www.ishir.com/blog/310482/can-your-ai-initiative-count-on-your-data-strategy-and-governance.htm">Can Your AI Initiative Count on Your Data Strategy and Governance?</a> appeared first on <a href="https://www.ishir.com/">ISHIR | Custom AI Software Development Dallas Fort-Worth Texas</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/12/can-your-ai-initiative-count-on-your-data-strategy-and-governance/" data-a2a-title="Can Your AI Initiative Count on Your Data Strategy and Governance?"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fcan-your-ai-initiative-count-on-your-data-strategy-and-governance%2F&amp;linkname=Can%20Your%20AI%20Initiative%20Count%20on%20Your%20Data%20Strategy%20and%20Governance%3F" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fcan-your-ai-initiative-count-on-your-data-strategy-and-governance%2F&amp;linkname=Can%20Your%20AI%20Initiative%20Count%20on%20Your%20Data%20Strategy%20and%20Governance%3F" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fcan-your-ai-initiative-count-on-your-data-strategy-and-governance%2F&amp;linkname=Can%20Your%20AI%20Initiative%20Count%20on%20Your%20Data%20Strategy%20and%20Governance%3F" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fcan-your-ai-initiative-count-on-your-data-strategy-and-governance%2F&amp;linkname=Can%20Your%20AI%20Initiative%20Count%20on%20Your%20Data%20Strategy%20and%20Governance%3F" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fcan-your-ai-initiative-count-on-your-data-strategy-and-governance%2F&amp;linkname=Can%20Your%20AI%20Initiative%20Count%20on%20Your%20Data%20Strategy%20and%20Governance%3F" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.ishir.com/">ISHIR | Custom AI Software Development Dallas Fort-Worth Texas</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Rishi Khanna">Rishi Khanna</a>. Read the original post at: <a href="https://www.ishir.com/blog/310482/can-your-ai-initiative-count-on-your-data-strategy-and-governance.htm">https://www.ishir.com/blog/310482/can-your-ai-initiative-count-on-your-data-strategy-and-governance.htm</a> </p>

Google to build subsea cables in PNG under Australia defence treaty

  • None
  • Published date: 2025-12-14 19:38:44

In a key upgrade to its digital backbone.

Google will build three subsea cables in Papua New Guinea, which the largest Pacific Island nation said was funded by Australia under a mutual defence treaty, in a key upgrade to its digital backbone… [+2714 chars]

Google to build subsea cables in PNG under Australia defence treaty

  • None
  • Published date: 2025-12-14 19:37:50

In a key upgrade to its digital backbone.

Google will build three subsea cables in Papua New Guinea, which the largest Pacific Island nation said was funded by Australia under a mutual defence treaty, in a key upgrade to its digital backbone… [+2714 chars]

Google to build subsea cables in PNG under Australia defence treaty

  • None
  • Published date: 2025-12-14 19:37:48

In a key upgrade to its digital backbone.

Google will build three subsea cables in Papua New Guinea, which the largest Pacific Island nation said was funded by Australia under a mutual defence treaty, in a key upgrade to its digital backbone… [+2714 chars]

Google to build subsea cables in PNG under Australia defence treaty

  • None
  • Published date: 2025-12-14 19:37:43

In a key upgrade to its digital backbone.

Google will build three subsea cables in Papua New Guinea, which the largest Pacific Island nation said was funded by Australia under a mutual defence treaty, in a key upgrade to its digital backbone… [+2714 chars]

Content Marketing Writer, Digital Security & Identity at Compose.ly

  • None
  • Published date: 2025-12-14 10:07:31

ObjectiveTo support client’s in-house marketing efforts across its portfolio of brands by providing high-quality, scalable content. This includes SEO articles, web copy, emails, and social media assets, with a strong preference for a writer comfortable using …

ObjectiveTo support clients in-house marketing efforts across its portfolio of brands by providing high-quality, scalable content. This includes SEO articles, web copy, emails, and social media asset… [+2230 chars]

Is P=NP?

  • Alfonso de la Rocha
  • Published date: 2025-12-14 09:16:58

Primer on complexity theory

You know when you wake up from a dream and you cant tell if it has happened in real life or not? This is what happened to me after waking up from the weirdest dream the other day. Ill spare you the d… [+9665 chars]

Infosecurity.US Wishes All A Happy Hanukkah!

  • None
  • Published date: 2025-12-14 00:00:00

None

<figure class=" sqs-block-image-figure intrinsic "> <p> <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/a5f0b000-ecbf-4d2b-93ed-f9bbeb54add4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+00.webp" data-image-dimensions="1024x682" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/a5f0b000-ecbf-4d2b-93ed-f9bbeb54add4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+00.webp?format=1000w" width="1024" height="682" sizes="auto, (max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload='this.classList.add("loaded")' srcset="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/a5f0b000-ecbf-4d2b-93ed-f9bbeb54add4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+00.webp?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/a5f0b000-ecbf-4d2b-93ed-f9bbeb54add4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+00.webp?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/a5f0b000-ecbf-4d2b-93ed-f9bbeb54add4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+00.webp?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/a5f0b000-ecbf-4d2b-93ed-f9bbeb54add4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+00.webp?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/a5f0b000-ecbf-4d2b-93ed-f9bbeb54add4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+00.webp?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/a5f0b000-ecbf-4d2b-93ed-f9bbeb54add4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+00.webp?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/a5f0b000-ecbf-4d2b-93ed-f9bbeb54add4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+00.webp?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs"><figcaption class="image-caption-wrapper"> <p class=""><strong>United States of America’s NASA Astronaut Jessica Meir’s</strong> Hanukkah Wishes from the International Space Station: Happy Hanukkah to all those who celebrate it on Earth! (Originally Published in 2019)</p> </figcaption></p></figure><figure class=" sqs-block-image-figure intrinsic "> <p> <a class=" sqs-block-image-link " href="https://www.infosecurity.us/blog/2019/12/24/happy-hanukkah"></a></p> <p> <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e675bd9b-513a-4f53-9c07-8f85637c89e4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+01.webp" data-image-dimensions="800x1000" data-image-focal-point="0.285,0.0" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e675bd9b-513a-4f53-9c07-8f85637c89e4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+01.webp?format=1000w" width="800" height="1000" sizes="auto, (max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload='this.classList.add("loaded")' srcset="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e675bd9b-513a-4f53-9c07-8f85637c89e4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+01.webp?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e675bd9b-513a-4f53-9c07-8f85637c89e4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+01.webp?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e675bd9b-513a-4f53-9c07-8f85637c89e4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+01.webp?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e675bd9b-513a-4f53-9c07-8f85637c89e4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+01.webp?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e675bd9b-513a-4f53-9c07-8f85637c89e4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+01.webp?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e675bd9b-513a-4f53-9c07-8f85637c89e4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+01.webp?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/e675bd9b-513a-4f53-9c07-8f85637c89e4/United+State%27s+NASA+Astronaut+Jessica+Meir+Hannukah+Greeting+01.webp?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs"></p> <p> <figcaption class="image-caption-wrapper"> <p class=""><strong>United States of America’s NASA Astronaut Jessica Meir</strong></p> </figcaption></p></figure><p><a href="https://www.infosecurity.us/blog/2025/12/14/infosecurityus-wishes-all-a-happy-hanukkah">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/12/infosecurity-us-wishes-all-a-happy-hanukkah/" data-a2a-title="Infosecurity.US Wishes All A Happy Hanukkah!"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Finfosecurity-us-wishes-all-a-happy-hanukkah%2F&amp;linkname=Infosecurity.US%20Wishes%20All%20A%20Happy%20Hanukkah%21" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Finfosecurity-us-wishes-all-a-happy-hanukkah%2F&amp;linkname=Infosecurity.US%20Wishes%20All%20A%20Happy%20Hanukkah%21" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Finfosecurity-us-wishes-all-a-happy-hanukkah%2F&amp;linkname=Infosecurity.US%20Wishes%20All%20A%20Happy%20Hanukkah%21" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Finfosecurity-us-wishes-all-a-happy-hanukkah%2F&amp;linkname=Infosecurity.US%20Wishes%20All%20A%20Happy%20Hanukkah%21" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Finfosecurity-us-wishes-all-a-happy-hanukkah%2F&amp;linkname=Infosecurity.US%20Wishes%20All%20A%20Happy%20Hanukkah%21" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://www.infosecurity.us/blog/2019/12/24/happy-hanukkah">https://www.infosecurity.us/blog/2019/12/24/happy-hanukkah</a> </p>

CIAM vs IAM: Comparing Customer Identity and Identity Access Management

  • None
  • Published date: 2025-12-14 00:00:00

None

<h2>Introduction: The Rise of Biometrics in Consumer Apps</h2><p>Biometrics are kinda everywhere now, aren't they? It feels like just yesterday passwords were the only game in town, but now, logging in with a fingerprint is almost second nature.</p><p>Here are some key reasons why biometrics are becoming prevalent in consumer apps:</p><ul> <li> <p><strong>Better User Experience:</strong> Let's be real, nobody <em>likes</em> typing in long, complicated passwords. Fingerprint logins are way faster and easier, which makes users happy. Think about opening your banking app with just a touch – way smoother than remembering a bunch of characters.</p> </li> <li> <p><strong>Security Boost:</strong> Strong biometrics, like fingerprints, is way tougher to crack than your average password. Plus, it's unique to <em>you</em>, making it way harder for someone else to get in.</p> </li> <li> <p><strong>Keeping Up with the Times:</strong> Security standards are always evolving, and biometrics help apps meet those higher bars. It's about staying ahead of the threats and keeping user data safe.</p> </li> </ul><p>The android biometric api is pretty cool because it gives developers a standard way to use biometric auth in their apps. it means less messing around with different devices and sensors, and more time focusing on making the app awesome. According to the android developer documentation, you can declare what type of authentication that your app supports using <code>BiometricManager.Authenticators</code> – this means you can choose between strong biometrics, weak biometrics, or even just device credentials like a pin.</p><p>Let's dive into the Android Biometric api itself and see what it's all about.</p><h2>Understanding the Android Biometric API</h2><p>Ever wonder how apps know it's <em>really</em> you logging in with your fingerprint? The Android Biometric api is the key – it's what lets developers tap into your device's fingerprint scanner (or other biometric hardware) in a standard, secure way.</p><p>The api offers a few different levels of authentication, depending on how secure you need things to be. it's not just "yes" or "no" when it comes to biometrics. According to the android developer documentation, you got three main options when you declare what type of authentication that your app supports using <code>BiometricManager.Authenticators</code>:</p><ul> <li> <p><strong>BIOMETRIC_STRONG:</strong> This is the top-tier stuff, using Class 3 biometrics. Think fingerprint scanners that meet really strict standards. Banking apps or anything dealing with sensitive financial info will probably use this. Class 3 biometrics generally involve hardware that meets rigorous security requirements, often including dedicated secure elements.</p> </li> <li> <p><strong>BIOMETRIC_WEAK:</strong> This is for less critical stuff, using Class 2 biometrics. Maybe facial recognition that isn't quite as precise. Could be good for quickly unlocking an app that doesn't store super-private data. Class 2 biometrics typically use hardware that's less stringent than Class 3, suitable for lower-risk authentication scenarios.</p> </li> <li> <p><strong>DEVICE_CREDENTIAL:</strong> This isn't technically biometrics, but it's in the same family. It means using your device's PIN, pattern, or password as a fallback. It's a good safety net if the fingerprint scanner glitches out, or if you're wearing gloves, for example.</p> </li> </ul><p>Before your app even <em>tries</em> to use biometrics, it needs to check if its available. The api has a handy function called <code>canAuthenticate()</code> that does just that.</p><pre><code class="language-java">BiometricManager biometricManager = BiometricManager.from(this); switch (biometricManager.canAuthenticate(BIOMETRIC_STRONG | DEVICE_CREDENTIAL)) { case BiometricManager.BIOMETRIC_SUCCESS: Log.d("MY_APP_TAG", "App can authenticate using biometrics."); break; case BiometricManager.BIOMETRIC_ERROR_NO_HARDWARE: Log.e("MY_APP_TAG", "No biometric features available on this device."); break; case BiometricManager.BIOMETRIC_ERROR_HW_UNAVAILABLE: Log.e("MY_APP_TAG", "Biometric features are currently unavailable."); break; case BiometricManager.BIOMETRIC_ERROR_NONE_ENROLLED: // Prompts the user to create credentials that your app accepts. final Intent enrollIntent = new Intent(Settings.ACTION_BIOMETRIC_ENROLL); enrollIntent.putExtra(Settings.EXTRA_BIOMETRIC_AUTHENTICATORS_ALLOWED, BIOMETRIC_STRONG | DEVICE_CREDENTIAL); startActivityForResult(enrollIntent, REQUEST_CODE); break; } </code></pre><p>If there's no biometric hardware, or if it's not working right, the app needs to handle that gracefully. And if the user hasn't even set up a fingerprint or face unlock yet, the app can guide them to the right settings screen.</p><h2>Implementing Fingerprint Login: A Step-by-Step Guide</h2><p>Okay, so you've got your development environment humming with the right dependencies. Now comes the fun part, crafting the biometric prompt that'll pop up on the user's screen. It's gotta be informative, clear, and maybe even a little bit friendly, you know?</p><p>This <code>PromptInfo</code> class is where you set all the text and options for the biometric dialog. Think of it as the blueprint for what the user sees.</p><ul> <li> <p><strong>Setting the Title and Subtitle:</strong> The title and subtitle should clearly state what the user is authenticating <em>for</em>. A good example is a banking app using "Confirm Transaction" as the title so that users know that they are approving a transaction.</p> </li> <li> <p><strong>Adding a Negative Button:</strong> This is super important. It's the "Oops, never mind" or "Use Password Instead" button. Always give users a way out of the biometric flow, especially incase they can't use their fingerprint due to gloves or something.</p> </li> </ul><pre><code class="language-java">PromptInfo promptInfo = new BiometricPrompt.PromptInfo.Builder() .setTitle("Confirm Transaction") // Example reflecting a specific action .setSubtitle("Log in using your fingerprint to confirm") // More descriptive subtitle .setNegativeButtonText("Cancel") .build(); </code></pre><ul> <li><strong>Allowed Authenticators:</strong> You'll need to pass in what type of biometric authentication your app supports using <code>setAllowedAuthenticators()</code>. According to the android developer documentation, you can choose between <code>BIOMETRIC_STRONG</code>, <code>BIOMETRIC_WEAK</code>, or <code>DEVICE_CREDENTIAL</code>.</li> </ul><p>Alright, so you've built this beautiful prompt, but what happens when the user actually <em>uses</em> it? That's where the authentication callbacks come in.</p><ul> <li> <p><strong><code>onAuthenticationError</code>:</strong> This is where you handle all the bad stuff. Like, the biometric sensor is broken, or the user cancels the auth. Make sure to display a helpful error message, not just a cryptic code. You can handle specific error codes like <code>BIOMETRIC_ERROR_NO_HARDWARE</code> or <code>BIOMETRIC_ERROR_HW_UNAVAILABLE</code> to provide tailored user feedback.</p> </li> <li> <p><strong><code>onAuthenticationSucceeded</code>:</strong> Woohoo! The user is legit. Now you can unlock the app, grant access to a feature, or whatever it is they were trying to do.</p> </li> <li> <p><strong><code>onAuthenticationFailed</code>:</strong> This one's a bit tricky. It means the fingerprint didn't match, but it <em>could</em> just be a fluke. Maybe the user's finger was dirty, or they didn't press hard enough. You can display a gentle "Authentication Failed" message. For a more robust retry strategy, consider implementing a counter for failed attempts and then gracefully degrading to a password or PIN prompt after a few tries, rather than immediately blocking the user.</p> <pre><code class="language-java">biometricPrompt = new BiometricPrompt(this, executor, new BiometricPrompt.AuthenticationCallback() { @Override public void onAuthenticationError(int errorCode, @NonNull CharSequence errString) { super.onAuthenticationError(errorCode, errString); // Example of handling specific error codes switch (errorCode) { case BiometricPrompt.BIOMETRIC_ERROR_NO_HARDWARE: Toast.makeText(getApplicationContext(), "No biometric hardware found.", Toast.LENGTH_SHORT).show(); break; case BiometricPrompt.BIOMETRIC_ERROR_HW_UNAVAILABLE: Toast.makeText(getApplicationContext(), "Biometric hardware is unavailable.", Toast.LENGTH_SHORT).show(); break; case BiometricPrompt.BIOMETRIC_ERROR_NONE_ENROLLED: Toast.makeText(getApplicationContext(), "No biometrics enrolled. Please set them up in your device settings.", Toast.LENGTH_SHORT).show(); break; default: Toast.makeText(getApplicationContext(), "Authentication error: " + errString, Toast.LENGTH_SHORT).show(); break; } } @Override public void onAuthenticationSucceeded(@NonNull BiometricPrompt.AuthenticationResult result) { super.onAuthenticationSucceeded(result); Toast.makeText(getApplicationContext(), "Authentication succeeded!", Toast.LENGTH_SHORT).show(); // Proceed with the authenticated action } @Override public void onAuthenticationFailed() { super.onAuthenticationFailed(); Toast.makeText(getApplicationContext(), "Authentication failed. Please try again.", Toast.LENGTH_SHORT).show(); // Implement retry logic here, e.g., increment a counter } }); </code></pre> </li> </ul><p>With the biometric prompt all set up, you're ready to actually, you know, authenticate the user.</p><h2>Enhancing Security with Cryptography</h2><p>So, you've got your fingerprint login working, but how do you <em>really</em> make it secure? That's where cryptography comes into play – it's what turns your biometric data into Fort Knox.</p><p>The <code>CryptoObject</code> is at the heart of securing biometric authentication. It wraps cryptographic primitives – think of them as fancy tools – like:</p><ul> <li> <p><strong>Signature:</strong> For verifying the <em>authenticity</em> of data. Imagine digitally signing a document with your fingerprint.</p> </li> <li> <p><strong>Cipher:</strong> For <em>encrypting and decrypting</em> data. It's like scrambling and unscrambling a message so only the intended recipient can read it. A hospital, for example, might use a cipher to encrypt patient records, ensuring only authorized personnel with the correct biometric credentials can access them.</p> </li> <li> <p><strong>Mac:</strong> (Message Authentication Code) For ensuring data <em>integrity</em>. It's like adding a tamper-proof seal to a package.</p> </li> </ul><p>It's not enough to just <em>use</em> cryptography; you gotta use it <em>right</em>. Android provides a secure vault called the <strong>Android Keystore</strong> system for storing cryptographic keys.</p><ul> <li> <p>The <code>KeyGenParameterSpec</code> lets you define how a key is generated. You can specify things like:</p> <ul> <li>Whether <strong>user authentication is required</strong> (<code>setUserAuthenticationRequired(true)</code>). This means the key can only be used <em>after</em> the user has authenticated with their biometrics.</li> <li>According to the Android developer documentation, you can also set <code>setInvalidatedByBiometricEnrollment(true)</code> to invalidate keys if the user enrolls a new biometric.</li> </ul> </li> </ul><p>Okay, let's put it all together. Here's a basic example of encrypting data using a <code>Cipher</code> and a <code>SecretKey</code>:</p><pre><code class="language-java">// Placeholder for getCipher() - in a real app, this would initialize the Cipher Cipher cipher = getCipher(); // Placeholder for getSecretKey() - in a real app, this would retrieve or generate the SecretKey from the Keystore SecretKey secretKey = getSecretKey(); try { cipher.init(Cipher.ENCRYPT_MODE, secretKey); byte[] encryptedInfo = cipher.doFinal(plainText.getBytes(Charset.defaultCharset())); // Use encryptedInfo } catch (UserNotAuthenticatedException e) { // This exception is thrown when the key requires re-authentication. // It means the user needs to authenticate again before the cryptographic operation can proceed. // You'll need to re-prompt the user for biometric authentication. biometricPrompt.authenticate(promptInfo); } catch (Exception e) { // Handle other potential exceptions like InvalidKeyException, etc. Log.e("CryptoError", "Encryption failed", e); } </code></pre><p>So, now we have a basic understanding of how cryptography enhances biometric security, let's look at securing the biometric data itself.</p><h2>Passwordless IAM and Fingerprint Login</h2><p>Okay, so you're ditching passwords, huh? Good for you! It's about time we moved on from those things, am I right? But how do you ditch the password but still make sure it's <em>really</em> you logging in?</p><p>Well, here's a few points to consider:</p><ul> <li> <p><strong>Reducing the Password Burden:</strong> Think of how much easier life gets when users don't have to remember a million different passwords. Fingerprint login makes it a breeze. A customer can quickly access their banking app to check their balance without the hassle of typing in a complex password.</p> </li> <li> <p><strong>Boosting Security:</strong> Fingerprints are way harder to steal than passwords. It's unique to each person, making it a more secure way to verify identity. This is super important for financial apps or healthcare portals where sensitive data is stored.</p> </li> <li> <p><strong>IAM Integration is Key:</strong> You can't just slap fingerprint login onto an app and call it a day. It needs to play nice with your existing Identity and Access Management (iam) system. This means making sure the biometric data is securely stored and that the system knows who's who.</p> </li> </ul><p>Honestly, I think fingerprint login is the way to go. It's easier for users, more secure, and it just makes sense in today's world.</p><p>So, what's next? Let's talk about how to make sure it's all working smoothly.</p><h2>Addressing Threats and Vulnerabilities</h2><p>Okay, so you're going passwordless, huh? That's awesome, but it's not all sunshine and roses. You gotta think about the bad guys trying to get in.</p><ul> <li> <p><strong>Spoofing Attacks</strong>: someone could try to fake a fingerprint or face to trick the system. Liveness detection is key here—making sure it's a real, live person and not a photo or mold. While Android doesn't provide a direct liveness detection API for all biometrics, developers can implement it by looking for subtle cues or integrating with third-party SDKs that specialize in this. Hardware-backed security helps too, using secure enclaves to store biometric data safely.</p> </li> <li> <p><strong>Data breaches</strong>: If the biometric data gets stolen, it's game over; so ya need to encrypt everything, both when it's moving and when it's sitting still. Use strong encryption algorithms and follow best practices for key management.</p> </li> <li> <p><strong>What if the fingerprint scanner breaks?</strong> Or the user is wearing gloves? Always have a fallback to a pin or password. The android biometric api lets you use <code>DEVICE_CREDENTIAL</code> for this very reason, as mentioned in previous sections.</p> </li> </ul><p>Implementing these safeguards isn't just about security; it's about trust. Users need to know their biometric data is safe and that there's always a way to get in, even if the tech hiccups a bit.</p><p>Next up, let's see how to make sure it's all working smoothly.</p><h2>Best Practices for a Seamless User Experience</h2><p>So, you've made it this far—congrats! But how do you ensure fingerprint login isn't just secure, but also a smooth experience for <em>actual</em> humans? Let's make it a win-win.</p><ul> <li> <p><strong>Be crystal clear</strong>: Prompts should explain <em>why</em> the fingerprint is needed—think "Approve Payment" instead of just "Authenticate". The Android developer documentation offers guidance on crafting effective prompts to ensure users understand the context.</p> </li> <li> <p><strong>Don't leave users hanging</strong>: Error messages need to be helpful—not just tech gibberish. Give options, like "Try again" or "Use PIN," you know?</p> </li> <li> <p><strong>Test. then test again</strong>: What works on a Pixel might be janky on a Samsung. Cover your bases, folks.</p> </li> </ul><p>Ultimately, fingerprint login is all about trust and convenience. Nail those, and you're golden.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/12/ciam-vs-iam-comparing-customer-identity-and-identity-access-management/" data-a2a-title="CIAM vs IAM: Comparing Customer Identity and Identity Access Management"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fciam-vs-iam-comparing-customer-identity-and-identity-access-management%2F&amp;linkname=CIAM%20vs%20IAM%3A%20Comparing%20Customer%20Identity%20and%20Identity%20Access%20Management" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fciam-vs-iam-comparing-customer-identity-and-identity-access-management%2F&amp;linkname=CIAM%20vs%20IAM%3A%20Comparing%20Customer%20Identity%20and%20Identity%20Access%20Management" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fciam-vs-iam-comparing-customer-identity-and-identity-access-management%2F&amp;linkname=CIAM%20vs%20IAM%3A%20Comparing%20Customer%20Identity%20and%20Identity%20Access%20Management" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fciam-vs-iam-comparing-customer-identity-and-identity-access-management%2F&amp;linkname=CIAM%20vs%20IAM%3A%20Comparing%20Customer%20Identity%20and%20Identity%20Access%20Management" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F12%2Fciam-vs-iam-comparing-customer-identity-and-identity-access-management%2F&amp;linkname=CIAM%20vs%20IAM%3A%20Comparing%20Customer%20Identity%20and%20Identity%20Access%20Management" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://mojoauth.com/blog">MojoAuth - Advanced Authentication &amp;amp; Identity Solutions</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by MojoAuth - Advanced Authentication &amp; Identity Solutions">MojoAuth - Advanced Authentication &amp; Identity Solutions</a>. Read the original post at: <a href="https://mojoauth.com/blog/ciam-vs-iam-customer-identity-access-management">https://mojoauth.com/blog/ciam-vs-iam-customer-identity-access-management</a> </p>

Google to build Australian-funded undersea cables in PNG

  • ABC News
  • Published date: 2025-12-13 03:00:42

PNG says the measure will provide a key upgrade to its digital backbone and link the north and south of the nation with high-capacity cables.

Google will build three subsea cables in Papua New Guinea, which the Pacific Island nation says is being funded by Australia under a mutual defence treaty. PNG said it would provide a key upgrade to… [+3171 chars]