Category: DZone Security Zone

Securing the IT and OT Boundary in Geospatial Enterprise Systems

In modern infrastructure, the line between information technology (IT) and operational technology (OT) is blurring. Enterprise geographic information system (GIS) platforms, delivered by leading providers such as Environmental Systems Research Institute Inc. (Esri) as an implementation partner, unify spatial context…

Designing a Secure API From Day One

Most APIs get secured after something breaks. A token leaks, an endpoint misbehaves, a pen test surfaces, an authorization gap. Suddenly, the team is patching a live system under pressure. That’s not a human failing — it’s an industry habit.…

Your AD Password Policies Are Security Theater

Last week, Microsoft published a three-phase plan to kill the NTLM authentication protocol. My LinkedIn feed filled up with celebrations. And I get it, the protocol has been a source of pain for decades. But almost nobody in those threads…

Understanding the Shifting Protocols That Secure AI Agents

New AI protocols are being adopted faster than most security teams can meaningfully assess their authentication and authorization models. MCP, A2A, and AP2 are reshaping how agents interact, but the identity layer underpinning them remains uneven and, in some cases,…