Strata Identity Expands Canadian Presence with New Toronto Office

Posted in Commentary with tags on October 1, 2025 by itnerd

Strata Identity, the Identity Orchestration company, today announced the opening of a new office in Toronto. This expansion builds on its already strong Canadian presence, with nearly 35% of employees based in the country. The announcement reinforces Strata’s position as a truly binational company with headquarters in Boulder, Colorado, and offices in Vancouver and now Toronto.

The addition of a Toronto location underscores Strata’s commitment to creating people-first workplaces across North America. The Toronto office will initially grow Strata’s engineering and product teams by tapping into the city’s globally recognized talent pool. Plans are also in motion to expand sales and other roles to support the company’s future growth.

Toronto is home to several of Strata’s largest customers and a dense concentration of financial services firms, making it a strategic location to strengthen partnerships and expand its Canadian market presence. Its proximity to major U.S. East Coast hubs such as New York and Boston also positions Toronto as an ideal bridge for supporting customers across North America.

As the tech hub of Canada, Toronto rivals leading U.S. cities for talent and innovation. It is home to some of the world’s largest technology companies, a thriving startup scene, and top universities. Beyond business, Toronto is a dynamic, multicultural city that offers employees and their families an exceptional quality of life.

Strata Identity enables organizations to orchestrate and modernize human and agent identities without disrupting existing infrastructure while maintaining a frictionless user experience. By decoupling identity from applications, Strata’s Maverics platform unifies SSO, can rationalize redundant IdPs, and ensures continuous access during outages via IdP failover. It enables organizations to extend Zero Trust controls across human, machine, and autonomous AI identities.

Led by CEO Eric Olden, co-author of the SAML standard, Strata also created the Identity Query Language (IDQL) and open-source Hexa project to help standardize multi-cloud identity management. Learn more at Strata.io.

ServiceNow unveils AI Experience, the UI for enterprise AI

Posted in Commentary with tags on October 1, 2025 by itnerd

ServiceNow today announced AI Experience, a unified, conversational front door to enterprise AI. With its context‑aware interface, the new AI Experience unites people and AI in a seamless, multimodal environment with built‑in governance, security, and the trust and transparency customers need as they implement AI meant for scale. Building on the foundation of Now Assist, AI Experience extends across any workflow, including the company’s autonomous Customer Relationship Management (CRM) offering, to transform sales and service — positioned to drive revenue growth and lasting customer loyalty. In an agentic AI era, it elevates the traditional user interface (UI) and becomes the intelligent entry point for employees to access information, delegate tasks, and collaborate with AI. 

Enterprises today suffer from decades of SaaS applications that define work in siloes and by departments. Many have dozens of separate AI solutions simply bolted onto existing systems, leaving employees juggling disconnected tools that don’t have access to the data they need to move work forward. With AI Experience, data, AI models, AI modalities, and workflows converge on a single, intuitive interface — empowering organizations to accelerate adoption, simplify access, and reduce employee AI learning gaps because ServiceNow works across workflows, not just a single app.

AI Experience represents a fundamental shift in how people interact with technology to get work done. It places AI at the forefront of the user experience with a powerful new multimodal, multilingual UI that allows instant access to voice, text, image, web, and build agents that are deeply connected to any part of the business, delivering context‑aware, personalized, and proactive interactions. AI Experience can anticipate needs, take action, and deliver results at enterprise scale.

With AI Control Tower — a central hub for governing, monitoring, and managing any AI asset, native or third‑party — enterprises can deploy AI Experience with confidence, giving them speed without losing security or control.

AI is the new UI: Putting AI at the center of how work gets done

At the core of AI Experience are intelligent, role‑aware AI agents that work side‑by‑side with employees to resolve issues, complete tasks, and drive outcomes. AI agents operate transparently, continuously learn, and give users full visibility and control, keeping AI always in the flow of work on one platform.

AI Experience introduces new capabilities such as:

  • AI Voice Agents: Offer hands‑free support that retrieve information, update records, and troubleshoot complex issues with human‑like fluency.
  • AI Web Agents: Learn from humans to complete tasks across third‑party apps and the web — clicking buttons, filling out online forms, and navigating internal sources and external systems, without APIs or integrations.
  • AI Data Explorer: Connects insights across ServiceNow and external data sources via Workflow Data Fabric, helping users investigate trends, pinpoint root causes, and document findings without leaving their workflow.
  • AI Lens: Turns what users see — screens, forms, and dashboards — into instant action, eliminating manual effort and accelerating decisions with AI‑powered automation. 

Autonomous CRM: Driving revenue and customer loyalty

Through the single‑architecture, single data model of the ServiceNow AI Platform, AI Experience can be instantly applied across enterprise workflows, including CRM. This marks a shift from legacy SaaS systems that passively track customer interactions to an AI‑native, revenue‑driving AI operating system that resolves customer issues and improves customer loyalty at every turn.

AI Experience transforms CRM from a static system of record into an AI‑first system of action. Instead of forcing employees to jump from app‑to‑app, spend time configuring quotes manually, or stitch together fulfillment processes, AI agents take on the manual, repetitive work, like scanning tickets, flagging patterns, and recommending response plans. This allows human agents to focus on complex decisions and real‑time improvements. 

In service, customers can get their issue resolved or request fulfilled through automation from the channel of their choice. In sales, a new AI‑powered Configure, Price, Quote (CPQ) solution accelerates quote generation that matches the customer’s need and frees sales reps to focus on customer relationships. Because AI agents and prebuilt workflows are built‑in, work moves smoothly across teams and tools. The result: problems get solved faster, costs can go down, employees stay focused on customers, and customers enjoy better experiences.

The foundation for enterprise‑ready AI

Rapid transformation to an AI‑first enterprise requires transparency, governance, and data to scale responsibly. The ServiceNow AI Platform delivers this foundation by uniting AI, data, and workflows to power autonomous actions — responsibly, transparently, and securely across the enterprise. 

Building on the governance and security capabilities within the ServiceNow AI Platform, ServiceNow also introduced new capabilities for AI Control Tower that span cross‑platform onboarding, proactive risk and compliance monitoring, and real‑time value tracking. ServiceNow also announced Now Assist model provider flexibility, which enables customers to integrate and choose from ServiceNow’s platform‑native LLMs and third‑party providers such as Azure OpenAI, part of Microsoft Azure AI Foundry, Anthropic Claude on AWS, or Google Gemini models. This allows organizations to align the most suitable AI model with the distinct demands of each workflow on the ServiceNow AI Platform, at no additional cost. With Workflow Data Fabric, ServiceNow can connect, catalog, and govern data across systems, offering a comprehensive framework for AI.

Availability

AI Lens is now generally available. AI Voice Agents, AI Web Agents, AI Data Explorer, and AI‑powered CPQ are expected to be available by the end of calendar year 2025. 

Additional Information

Read more about AI Experience from our President, Chief Product Officer, and Chief Operating Officer, Amit Zavery on the ServiceNow blog.

Ericsson Wireless WAN solution enables increased productivity and improved workflow for Coffrages Synergy Formwork

Posted in Commentary with tags on October 1, 2025 by itnerd

Ericsson’s enterprise wireless solutions are supporting Coffrages Synergy Formwork as the company focuses on being a leader in innovation in the construction industry, while improving productivity and processes.

Through the deployment of a reliable Ericsson wireless wide area network (WAN), Synergy’s employees are better equipped to do their work, with stable access to applications and devices they need – even when they’re on a high floor of a project site.

Coffrages Synergy is a Montreal-based construction company that specializes in formwork and high-rise towers. The organization has more than 1,500 employees working on jobsites across Québec and Ontario, including Ottawa, Gatineau, Québec City, Montreal and now Halifax, N.S.

Reliable internet connectivity is imperative on construction sites in order to enable employees’ access to important applications and information. However, the vastness of job sites was impacting the ability of Synergy’s workers to stay connected. Getting wires to a new build job site is also a complex process that is subject to onsite issues and statuses. Wired networks in particular posed difficulties for Synergy, as crews frequently move between different floors during their projects.

Extending wired networks across multiple floors of high-rise projects proved not only to be time-consuming and disruptive to ongoing construction, but also very costly and highly inefficient.

To solve this issue, the company needed a wireless network that could effectively support all requirements. Synergy created portable office units called Sky Shacks that can move from floor to floor of a high-rise under construction. The units are equipped with devices including tablets, laptops and printers, so employees can easily access what they need to work without having to descend to the ground floor. Synergy selected Ericsson Cradlepoint R2100 5G and S700 4G routers to create a reliable Wi-Fi network that connects these devices and extends internet access across the floors of the high-rise project. So far, the company has rolled out 67 Sky Shacks across their project sites delivering reliable connectivity to even the highest floors.

As employees move to work on a different floor of a high-rise project, the Sky Shack follows, providing a stable network to connect to cloud applications and more.

Synergy’s workflow has significantly improved since implementing the wireless WAN solution:

  • As Sky Shacks can be quickly relocated to new floors without the need for time-consuming wired installations, the organization has seen a considerable reduction in downtime
  • Improved connectivity has in turn increased overall productivity with seamless access to cloud-based construction software, plans, and communication tools driving + 4.2 TB of cellular data per month
  • Overall, the new efficiencies gained have translated into substantial cost savings, eliminating expenses associated with wired infrastructure and on-site troubleshooting

Unit 42 Identifies New Major Chinese APT Group Targeting Global Diplomats & Telecoms

Posted in Commentary with tags on October 1, 2025 by itnerd

After a nearly three-year investigation, Unit 42 has identified a previously unknown Chinese state-sponsored threat actor we’ve named Phantom Taurus. This isn’t just another threat actor; their methods, tools, and relentless persistence place them in a new top tier of global threats.

What makes Phantom Taurus significant?

  • Unique and Sophisticated: They operate with entirely unique tactics and a custom arsenal of previously undocumented malware, setting them apart from all other known Chinese APTs. 
  • Dual-Mission Focus: They are surgically targeting both high-level geopolitical intelligence and entities (embassies, foreign ministries, diplomats) and critical telecommunications infrastructure. 
  • Unprecedented Persistence: This is what truly sets them apart. When most threat actors are discovered, they retreat for weeks or months. Phantom Taurus regroups and re-enters target networks within hours or days. Their mission is so critical they are willing to risk exposure to maintain access.
  • They Go for the Jugular: Instead of common phishing attacks, they meticulously research their targets and bypass users to directly compromise critical infrastructure to steal entire mailboxes or gain a persistent foothold for data collection.

This group is well-resourced, geopolitically aware, and poses a formidable, ongoing threat with a primary geographic focus on Africa, the Middle East, and Asia.

Here is the full, in-depth report detailing their custom tools, malware, and tactics: http://unit42.paloaltonetworks.com/phantom-taurus

Cybersecurity Awareness Month Starts Today

Posted in Commentary with tags on October 1, 2025 by itnerd

In recognition of October’s Cybersecurity Awareness Month, I wanted to offer insights from Corian (Cory) Kennedy, Chief Threat Intelligence Officer at SecurityScorecard

“‘Is my organization hacked right now?’ 

How confident is your answer? Cybersecurity Awareness Month is a call to action for every organization to validate their cyber defenses, to make time to understand the confidence in their answer to that question. Threats are very good at evolving quickly, working tirelessly to catch you off guard.  Awareness is an important phase of a larger process to pivot from reacting to successful threats to defensive action.

Many factors drive cyber risk, one blind spot stands out: your pipeline of vendors, suppliers, and partners. Each of these introduces a unique risk, but many organizations still lack a clear view into where those vulnerabilities exist and what their risk appetite truly is. By seeing their own security posture and the risk levels of connected vendors, businesses can prioritize fixes, reduce exposure, and drive accountability across the supply chain.

This month is a chance for every business to commit to taking meaningful action. Start by prioritizing the real-time insight into their cyber posture, including third-party risk. This clarity allows for faster decisions, stronger defenses, and measurable progress. Once you can see the risk, you can reduce it.”

UPDATE: Roland Palmer, VP of Security & Compliance at Sumo Logic adds this comment:

“The most important thing we can all do is to make sure we’re doing the basics of cybersecurity consistently. If everyone performs the small things in the correct way and sustains that effort across 12 months every single year, that’s a very solid baseline for safeguarding everything from identity to data. Use training and awareness as a culture builder. It sounds small, but it’s the most impactful work that you can do, especially as people are increasingly bringing their own AI tooling. We need to keep empowering people to make the best choices they can for security, day after day.

If I have one piece of advice for October’s cybersecurity awareness month, I’d say to pick something this month that you can implement. Do one extra thing this month to improve your security posture and stick with it for the rest of the year. See how that improves your security a year from now!”

Mike Anderson, VP, Partnerships, Abstract Security Adds this:

“I’ve always reminded myself that relationships formed in trust are a cornerstone of cybersecurity awareness. Technology infused with AI can replicate workflows, but it will struggle to replace the discipline & strength people build in each other. That kind of power emerges when organizations invest in their people, creating cultures that amplify protection in ways security tools alone can’t fully mirror.”

UPDATE #2: I have additional comments starting with Steve Povolny, Senior Director of Security Research at Exabeam:

“Cybersecurity Awareness Month underscores a critical, often underestimated reality: insider threats represent the most dangerous risk to organizations today. According to Exabeam research, 64% of cybersecurity leaders agree that insider threats are more dangerous than external actors, and the risk is intensifying. With the rise of generative AI, two of the top three insider threat vectors are now AI-related.

Despite this rising threat, most organizations remain underprepared. Eighty-eight percent of security leaders say they lack the behavioral analytics needed for early detection. Meanwhile, only 44% report using User and Entity Behavior Analytics (UEBA), a key capability for identifying abnormal activity and compromised credentials before they lead to serious incidents. Insider threats have evolved. They’re faster, more sophisticated, and increasingly AI-enabled. Security operations need to evolve, too.”

Renuka Nadkarni, Chief Product Officer at Aryaka:

“Cybersecurity Awareness Month’s theme of Building a Cyber Strong America underscores that resilience is not just a government or enterprise issue, it’s a shared responsibility across every sector and individual. From protecting small businesses against ransomware to securing critical infrastructure to empowering citizens with practical habits like MFA, patching, and phishing awareness, the focus is on collective strength. By aligning education, technology, and collaboration, we create a layered defense that not only reduces risk but also reinforces national security and trust in the digital economy.” 

Today’s interconnected world means a single weak link can ripple across industries and borders. It’s all about closing those gaps, whether it’s addressing supply chain risks, securing remote work, or ensuring public and private sectors work hand in hand. By embracing proactive defense strategies, investing in cyber skills, and making security part of daily culture, America can move from being reactive to truly resilient in the face of evolving threats.”

Nick Tausek, Lead Security Automation Architect at Swimlane:

“This Cybersecurity Awareness Month provides an opportunity for us to turn our heads towards the future of threat defense. The integration of agentic AI is quickly emerging as the next critical threshold for cybersecurity platforms, one that organizations must cross to keep pace with adversaries already exploiting these capabilities for malicious gain.

By automating Tier-1 tasks like initial incident response, preliminary evidence analysis, and documentation, agentic AI significantly reduces the workload on SOC analysts. This not only alleviates resource constraints but also allows security teams to reallocate their time and expertise toward advanced threat prevention and strategic risk reduction. Ultimately, embracing agentic AI strengthens an organization’s overall security posture, transforming awareness into action and helping defenders stay one step ahead.”

Pete Luban, Field CISO at AttackIQ:

“Cyber threats to organizations have never been higher than they are in 2025. With powerful cybercrime groups like Scattered Spider and ShinyHunters conducting attacks that span across the globe, as well as the proliferation of insider threats made possible by the integration of AI into attack vectors, organizations have become overwhelmed by the multitude of different angles they can be hit from.

It’s time to start fighting back and get a step ahead of the actors who seem to have organizations beat at every turn. By studying the tactics that cybercrime organizations or individual actors employ when breaching systems, security teams can train their defenses to recognize when those strategies are used against them and react accordingly. Utilizing adversarial emulation techniques helps cybersecurity platforms identify potential areas of exploitation and alert security teams to handle them swiftly.”

Craig Birch, Principal Technologist at Cayosoft

As we observe National Cybersecurity Awareness Month this October, organizations must confront a sobering reality: 88% of cyber attacks involve Active Directory, yet identity security remains dangerously overlooked. Active Directory’s 25-year legacy has created a perfect storm of vulnerabilities through misconfigurations, shadow admin permissions, and toxic attack path combinations that provide attackers with multiple entry points. The recent evolution of ransomware from simple encryption to sophisticated cyber extortion demonstrates that threat actors have shifted their focus to the identity layer, where a single user’s LinkedIn post can initiate a chain reaction leading to complete domain compromise.

Traditional perimeter defenses are insufficient in our cloud-first, remote work reality. When Active Directory fails, business operations come to a halt, making comprehensive identity protection strategies essential. Organizations need continuous monitoring, secure delegation, and clean, reliable, and instant recovery capabilities that can eliminate standing privileges and provide rapid, validated recovery. Standard backup solutions often restore the very persistence mechanisms attackers embed, making this October a critical time to move beyond awareness to action.

UPDATE #3: I have additional commentary from Cary Vidal, VP of IT & Security at Exclaimer:

“Cybersecurity Awareness Month is a timely reminder that organizations must remain vigilant about all aspects of their digital footprint. Email signatures are often overlooked, yet can introduce unnecessary risks when they’re unmanaged. Unsecured or inconsistent signatures can be exploited, whether through unauthorized changes, inaccuracies, or failure to meet regulatory standards. 

Rather than viewing them as a branding tool, organizations should see email signatures as being both a professional touchpoint and part of their broader security posture. Centralized management of signatures means they remain consistent, accurate, and tamper-proof, reducing the risk of human error and misuse. 

For companies undergoing wholesale change, such as through mergers and acquisitions, this becomes even more important, as unmanaged signatures can expose the business to compliance gaps, reputational damage, or legal liabilities. By using a secure, centralized email signature management platform, organizations can maintain control, safeguard stakeholder trust, and strengthen their security posture without leaving this detail to chance.”

UPDATE #4: More commentary starting with Eric Polet, director of product management at Arcitecta:

Data security and governance is an ethical imperative

An organization’s credibility now depends as much on the integrity of its data infrastructure as on the integrity of its findings. In this high-stakes environment, immutability, traceability, and governance aren’t just operational necessities, they’re ethical imperatives. Metadata-driven systems are becoming a crucial operating backbone, automating access, retention, and policy enforcement while enabling secure collaboration across global locations. Organizations that thrive will be those that design for resilience, building zero-trust, metadata-rich, immutable data environments that protect both integrity and reputation.

Matthew Stern, Chief Security Officer at Hypori:

“Cybersecurity Awareness Month is a reminder that mobile security can no longer be an afterthought. With the continued rise of BYOD, smartphones are no longer just personal devices. They now carry sensitive company data, credentials, and access to enterprise apps, often without the protections applied to traditional endpoints. As personal and professional use converge, organizations must recognize that mobile devices are now central to the threat landscape.

Mobile threats often unfold without warning. Attackers exploit overlooked vulnerabilities like unsecured apps, outdated software, or weak authentication to gain quiet access. From there, they can move into enterprise systems, bypassing traditional defenses. Many companies only discover the breach after the attacker has already infiltrated their network.

This month is a chance to shift how organizations think about mobile risk. Security must extend to every device that touches company data, even if the business does not own it. Employees should be able to use their phones confidently, knowing their personal information is protected, and their company’s data is secure. When personal and professional use converge, security must be built to protect both.”

UPDATE #5: Khash Kiani, Head of Security, Trust, and IT at ASAPP, shared this perspective for Cybersecurity Awareness Month:

“Generative AI is everywhere—and most tools require access to your organization’s most confidential data. This Cybersecurity Awareness Month, leaders need to go beyond the basics and understand the new wave of risks generative AI introduces. Everyone knows the general concept of cybersecurity, but few are prepared for emerging threats like prompt injection and data poisoning. These are subtle, dangerous, and often invisible ways in which AI systems can be manipulated.

With traditional deterministic software, security testing can identify most vulnerabilities. But with generative AI, the same reviews may miss nuanced risks—like a malicious prompt hidden in customer feedback that bypasses controls, or two AI agents communicating in ways that leak sensitive data. Data poisoning poses another unique challenge: if attackers feed false or malicious information into your training data or knowledge sources, your AI can learn to behave incorrectly or even reveal private information later.

UPDATE #6:  Rich Dandliker, Chief Strategy Officer at Veza adds this comment:

“Visibility has become the single most critical factor in cybersecurity resilience—and the shift to an identity-first defense is no longer optional. As Gartner predicts, ‘By 2028, 70% of CISOs will leverage an Identity-Verification and Intelligence Platform (IVIP) to reduce their IAM attack surface.’

The real threat isn’t the breach itself–it’s the invisible sprawl of permissions lurking inside systems like SharePoint.

Continuous visibility across every identity—human and machine—is essential to enforce least privilege and stop credential-based intrusions before attackers gain persistence.

Identity security is no longer an IT task—it’s a core security discipline demanding full-spectrum visibility, privilege control, and behavioral monitoring. The path of least resistance is no longer the network–it’s identity.” 

Hackers Distribute Malicious AI Tools Through Chrome Extensions 

Posted in Commentary with tags on September 30, 2025 by itnerd

According to researchers, threat actors are distributing fake Chrome extensions posing as AI tools to hijack prompts in the Chrome search bar and then redirect queries to attacker-controlled domains and track search activity.

More info via this Github link from Palo Alto Networks:  https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2025-09-24-IOCs-for-AI-prompt-hijacker-extensions.txt

Davit Asatryan, VP of Research at Spin.AI, commented:

“Malicious AI-themed extensions show how attackers are quick to exploit hype to bypass user trust and enterprise defenses. What many don’t realize is that browser extensions can act like shadow IT, silently harvesting sensitive data. Organizations should treat extensions as part of their attack surface and implement continuous risk monitoring to prevent these threats before they spread.”

This underlines the fact that there are dangers with anything that gets onto your computer. Which means that you should always be wary of what you install regardless of what it is.

Financial Services Industry: Strong at Prevention, But Weak at Vulnerability Remediation

Posted in Commentary with tags on September 30, 2025 by itnerd

Cobalt today released its State of Pentesting in Financial Services 2025 Report with new insights into how the financial services industry identifies and resolves serious security vulnerabilities. Cobalt pentesting data shows that the financial services sector is accruing security debt and a backlog of serious vulnerabilities. Although financial services firms have one of the lowest rates of serious vulnerability findings, they are among the slowest industries to remediate them.

Financial Services Findings: Strengths and Backlogs

  • Low rate of serious findings: Financial services organizations rank near the top for preventing serious vulnerabilities from appearing at all.
  • Moderate resolution rates: The industry resolves about two-thirds (66.7%) of serious findings, ranking 10 out of the 13 industries Cobalt researched. 
  • Slow median time to remediation (MTTR): At 61 days, financial services ranks 11th of 13 industries, well behind hospitality, which resolves serious findings in 20 days.
  • Backlogs reflected in half-life: Financial services has a half-life of 147 days for serious findings, placing ninth overall, out of the thirteen industries measured. Half-life, unlike MTTR, accounts for unresolved vulnerabilities and provides a fuller picture of backlog and risk.

Vulnerability Profile: Automation Strengths, Human Testing Gaps

The financial services sector excels at addressing straightforward, code-level vulnerabilities, thanks to mature AppSec programs, automated scanning (SAST/DAST), and strong secure coding standards. This results in significantly lower rates of cross-site scripting (5.0% vs. 9.7%) and server-side injection (4.2% vs. 5.3%) in web applications and APIs, compared to other industries.

However, pentests reveal blind spots where automation falls short. The industry struggles with:

  • Sensitive data exposure: 10.5% vs. 8.0% average in other industries.
  • Business logic flaws: 2.9% vs. 2.3% average in other industries.
  • Server security misconfigurations: 34.9% vs. 27.9% average in other industries.
  • Components with known vulnerabilities: 6.1% vs. 5.5% average in other industries.

These vulnerabilities often require human-led pentests to uncover because they involve complex data flows, legacy systems, and application-specific logic that scanners cannot interpret.

Pentesting Practices and Pressures

While financial services firms struggle to resolve most serious issues (61 day MTTR, 147 day half-life, and one-third of serious issues never resolved), they do maintain a solid track record in meeting strict internal service level agreements (SLAs) for the remediation of serious vulnerabilities. Deeper operational data reveals significant systemic bottlenecks, and major backlogs of vulnerabilities that expose financial organizations to risks of data loss and breaches. 

The industry’s exposure due to slow remediation speed is amplified by external threats and internal challenges—ranging from scheduling delays to the escalating risks posed by third-party software vulnerabilities, genAI complexity, and insider threats.

  • SLAs narrowly met: Despite their 61-day MTTR for serious issues overall, 78% of financial services firms report fixing critical vulnerabilities in business-critical assets within 14 days, in line with SLA requirements.
  • Scheduling challenges: 70% report that pentest scheduling delays sometimes impact compliance or business timelines, meaning potential security risks remain unaddressed for a longer period.
  • Top risks: Financial services leaders highlight third-party software (76%), genAI-related risks (68%), and insider threats (46%) among their greatest concerns.

Additional Resources:

Methodology

The findings in the State of Pentesting in Financial Services 2025 is based on 10 years of Cobalt pentesting data, and data from Emerald Research, an independent third-party research firm, sponsored by Cobalt. The survey included 500 respondents, consisting of security leaders, defined as a mix of C-level and VP-level security professionals, and security practitioners, representing organizations with 500 to 10,000 employees.

1st Anniversary of Black Kite Bridge: Strong Momentum & Adoption Surpassing 100K Intelligence Items Shared

Posted in Commentary with tags on September 30, 2025 by itnerd

Black Kite today announced significant momentum on the first anniversary of Black Kite Bridge™, the industry’s first solution enabling customer-vendor collaboration to dramatically reduce response time to cyber events in the supply chain. Black Kite Bridge™ has built a strong community of thousands of third parties, growing over 100% quarter over quarter, with sharp growth spikes following major incidents, when timely intelligence sharing and response are critical to containing cascading risks.

Customers are enabled to overcome the challenges of third-party risk management, which are exacerbated by ineffective communication, including manual outreach using email and spreadsheets, and vendors lacking the actionable intelligence they need to investigate and resolve risks quickly. The community, collaboration, and automation that Black Kite Bridge™ delivers have enabled customers to achieve vendor response rates upwards of 85% and reduce the time from discovery to intelligence sharing from days to minutes. Key intelligence items shared include vulnerability intelligence, Black Kite RSI™, mitigation recommendations, and improvement guides. 

Black Kite Bridge™ was purpose-built to bridge the gap between risk intelligence and action, automating third-party cyber risk management end-to-end, from identifying risks and vulnerable vendors all the way to intelligence sharing and remediation progress tracking, and reporting. Black Kite Bridge™ drives collaboration and streamlines communications between Black Kite customers and their suppliers. Customers can invite partners to a single, shared platform to quickly share intelligence and findings, request remediations, and track progress, reducing overhead and driving timely resolution.

Black Kite Bridge™ key benefits include:

  • Eliminate tedious workflows: Leverage AI and automation to identify vulnerable vendors, draft communication, and share intelligence in minutes, not days. 
  • Increase third-party collaboration: Bring all intelligence sharing, tickets, and communications into a single, shared platform.
  • Reduce risk and response time: Empower your vendors to act fast by giving them instant access to Black Kite intelligence, such as Black Kite FocusTags™, Black Kite RSI™, findings, reports, and more. 
  • Streamline reporting for auditors and leadership: Maintain a record of shared intelligence, vendor communications, status updates, and outcomes, simplifying reporting on cyber event response, vendor assessments, and resolved findings.
  • Strengthen the entire ecosystem: By sharing intelligence and acting together, every user contributes to a safer, more resilient network – turning individual efforts into collective security.

Looking ahead, and based on this year’s usage metrics, trends, and results, Black Kite predicts that over 1.5 million intelligence items will have been shared via The Bridge™ over the next two years. The enthusiastic adoption of Black Kite Bridge™ validates the company’s vision to improve the health and safety of the global cyber ecosystem through a collaborative security intelligence network. 

For more information, contact the Black Kite team

Connect with Friends and Family In LEGO Party! Available Today!

Posted in Commentary on September 30, 2025 by itnerd

Developer SMG Studio, the LEGO Group, and Fictions launched their wildly fun multiplayer party game, LEGO® Party!, on Steam for PC, Xbox Series X|S, Xbox One, PlayStation®5 (PS5™), PlayStation®4 (PS4™), and Nintendo Switch™. The Retail Edition is also available now at https://legoparty.iam8bit.com and participating retailers for Nintendo Switch, PlayStation 5 and Xbox Series X|S, alongside the digital release. In addition, those who pre-ordered the Retail Edition will be receiving a download code for five unique LEGO Minifigures.

Fans can now jump into a number of exciting features, including more than a gazillion (*not a real number) customization combinations of minifigures, incredible LEGO themed Challenge Zones, 60 action-packed minigames and more, all in the quest to collect the most LEGO Golden Bricks and become the ultimate LEGO Party! champion.

Bring out your competitive side and dive into the mini-game mayhem, featuring giant space aliens, power-up popping rainbow unicorns, lava-roasted rotisserie turkeys and more, all of which can be viewed in the newest LEGO Party! launch trailer here: 

LEGO Party! is an up to four-player party game that’s built different! Compete against your friends in wacky Challenge Zones and 60 hilarious minigames from across your favorite LEGO sets like LEGO Pirates, LEGO Space, LEGO NINJAGO® and more. Join your friends online or get together on the couch for a LEGO Party! game night. With multiple game modes and tons of minifigures to unlock, you’ll have all the bricks to build the ultimate party! Challenge players near or far, customize your character, and compete in a variety of awesome minigames to get as many Golden Bricks as you can by any means necessary! But beware, watch out for monsters, traps and flying roast turkeys on your way to becoming the next star of LEGO Party!

For all the latest updates on the game, follow LEGO Party! at: http://www.legoparty.com

The CISA warns of a Sudo Privilege Escalation Flaw 

Posted in Commentary with tags on September 30, 2025 by itnerd

The CISA has warned that a local privilege escalation vulnerability in Sudo (CVE-2025-32463, CVSS 9.3) is being actively exploited in the wild. The flaw, introduced in Sudo version 1.9.14 in 2023, allows any local user to execute commands with root privileges, even without being in the sudoers file. Exploitation requires tricking Sudo into loading a malicious /etc/nsswitch.conf file via the chroot feature, which has since been deprecated. The issue was patched in June with Sudo version 1.9.17p1, but proof-of-concept exploits have circulated since July, and CISA has mandated remediation within three weeks for federal agencies under BOD 22-01. 

John McShane, Principal Product Manager for AI & Data Science, Cobalt:

     “Privilege escalation flaws like this sudo chroot issue reinforce a recurring pattern in security: when high privilege software accepts untrusted input or environmental control without guardrails, the downstream impact can be massive. Remember last year’s CrowdStrike Falcon outage (CVE-2025-1146)? A malformed update triggered system crashes at scale across airlines, hospitals, and critical infrastructure. In both cases the root failure was trusted high privilege logic failing in edge scenarios, which is exactly why testing must include more than happy-path unit tests. Fuzzing that targets config and path resolution logic, focused penetration testing that simulates hostile environments, and unit and integration tests all could have caught this earlier.”

Wade Ellery, Chief Evangelist and IAM Strategy Officer, Radiant Logic:

     “Security and defense from attack needs to be a multilayered operation.  Compromising the network perimeter and in this case local access to a server and then taking over a benign local account dramatically increases the threat to the organization.  When a vulnerability then allows any compromised local account to be escalated to root privileges the threat becomes catastrophic.  In most organizations there are no further walls between the attacker and his targets.  Layering in an additional line of defense is critical to stopping such an attack.  Adding continuous observability into who is accessing what resources, and how privilege is being escalated shines the light into the dark corners of today’s vulnerabilities.  Leveraging near real-time controls and remediation can prevent the escalated account from operating outside their original limited access.  Strong identity governance combined with timely patching ensures that when privilege escalation attempts occur, they are detected, prevented, and contained before causing lasting harm.”

“This vulnerability illustrates how access and identity intersect with system-level controls. Even without being in the sudoers file, an attacker could gain full privileges, bypassing established access policies. That underlines the importance of continuous observability into who is accessing what resources, and how privilege is being escalated. Without that visibility, organizations are blind to the subtle shifts that transform a minor intrusion into a full compromise. Strong identity governance combined with timely patching ensures that when privilege escalation attempts occur, they are detected, prevented, and contained before causing lasting harm.”

This is another one of those today problems that affected organizations need to deal with. And it needs to be dealt with ASAP. So it’s once again it’s time to patch all the things.