<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[MUSTARDTREE GROUP Technology Briefings]]></title><description><![CDATA[Cybersecurity and Technology Briefings from Analysts at the MustardTree Group. Specialists in Technology, Cybersecurity, business intelligence, and strategic advisory.]]></description><link>https://blog.mustardtreegroup.com</link><image><url>https://substackcdn.com/image/fetch/$s_!JvKk!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d330ce-e3f8-4a23-b8c7-8e86d3602f01_398x398.png</url><title>MUSTARDTREE GROUP Technology Briefings</title><link>https://blog.mustardtreegroup.com</link></image><generator>Substack</generator><lastBuildDate>Thu, 14 May 2026 20:10:50 GMT</lastBuildDate><atom:link href="https://blog.mustardtreegroup.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Samuel Odekunle]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[sodekunle@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[sodekunle@substack.com]]></itunes:email><itunes:name><![CDATA[Samuel Odekunle]]></itunes:name></itunes:owner><itunes:author><![CDATA[Samuel Odekunle]]></itunes:author><googleplay:owner><![CDATA[sodekunle@substack.com]]></googleplay:owner><googleplay:email><![CDATA[sodekunle@substack.com]]></googleplay:email><googleplay:author><![CDATA[Samuel Odekunle]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Quantum Acceleration Meets AI-Driven Vulnerability Discovery]]></title><description><![CDATA[May 14th MTG Update - By Josh Banks & Sam Odekunle]]></description><link>https://blog.mustardtreegroup.com/p/quantum-acceleration-meets-ai-driven</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/quantum-acceleration-meets-ai-driven</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Thu, 14 May 2026 09:51:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JvKk!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d330ce-e3f8-4a23-b8c7-8e86d3602f01_398x398.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The week of May 7&#8211;14, 2026 delivered a stark juxtaposition for security leaders: a record-breaking 50-qubit simulation milestone on Europe&#8217;s JUPITER exascale supercomputer arrived just as Anthropic CEO Dario Amodei publicly warned that AI-powered vulnerability discovery has opened a six-to-twelve month window for organizations to patch tens of thousands of newly identified flaws. Both forces are now actively reshaping the cryptographic and operational risk landscape simultaneously &#8212; and neither is theoretical.</p><p>The week&#8217;s defining cybersecurity event was <em>Microsoft&#8217;s May Patch Tuesday, which addressed 137 vulnerabilities, 31 of which were marked critical, with none observed being actively exploited in the wild</em> &#8212; the first such clean release in nearly two years. But the relief is fragile: <em>Microsoft disclosed that 16 of the flaws fixed this month across the Windows networking and authentication stack were identified through its new multi-model AI-driven vulnerability discovery system, codenamed MDASH (multi-model agentic scanning harness)</em>, and <em>Tenable&#8217;s Satnam Narang noted Microsoft has already patched over 500 CVEs five months into the year &#8212; a volume reflecting a broader trend where vulnerability discovery has scaled new highs via AI-powered approaches</em>.</p><p>On the breach front, education technology giant Instructure suffered one of the year&#8217;s most consequential intrusions, ShinyHunters expanded its Salesforce-targeting rampage to Cushman &amp; Wakefield, and Trellix &#8212; a cybersecurity vendor &#8212; disclosed its own source-code repository breach. Meanwhile, quantum computing&#8217;s timeline compression continues to validate NIST&#8217;s call for immediate post-quantum migration.</p><p></p><h1><strong>Key Developments</strong></h1><h2><strong>Microsoft&#8217;s &#8220;No-Zero-Day&#8221; Patch Tuesday Masks an AI-Driven Volume Surge</strong></h2><p>For the first time since June 2024, Microsoft shipped a monthly security update with zero actively exploited or publicly disclosed zero-day vulnerabilities. The headline number, however, obscures a structural shift.</p><p>Of 31 &#8220;critical&#8221; entries, 16 are remote code execution vulnerabilities spanning Microsoft Office, Word, Windows Native WiFi Miniport Driver, Azure, Dynamics 365, Windows GDI, SharePoint, Windows Graphics Component, Netlogon, and Windows DNS Client.</p><p>Among the most severe: <em>CVE-2026-41096 (CVSS 9.8), a heap-based buffer overflow in Windows DNS that could allow an unauthorized attacker to execute code over a network</em>, and <em>CVE-2026-42898 (CVSS 9.9), a code injection vulnerability in Microsoft Dynamics 365 (on-premises) allowing an authorized attacker to execute code over a network</em>.</p><p><strong>Why it matters: </strong>The AI-discovery pipeline is now mainstream. <em>Microsoft&#8217;s MDASH discovered 16 of the Patch Tuesday vulnerabilities, and Palo Alto used Mythos to find dozens of flaws.</em></p><p>Oracle has responded structurally: <em>Oracle said it will supplement its quarterly Critical Patch Update fixes with monthly security releases focused on high-priority vulnerabilities, citing the increased pace of AI-assisted vulnerability disclosures stemming from adoption of AI models like Anthropic Mythos. The first monthly Critical Security Patch Updates will arrive on May 28, 2026.</em></p><p><strong>Strategic implications: </strong>The cadence of enterprise patching is being forcibly compressed. CISOs should expect monthly fix volumes to roughly double over the next 12 months and reallocate vulnerability management budgets toward automated triage, runtime mitigation, and exposure-management tooling.</p><h2><strong>Instructure/Canvas Breach Hits 275 Million Education Users</strong></h2><p>Education technology giant Instructure, operator of the Canvas learning management system, suffered a significant data breach on May 7, 2026. The ShinyHunters cybercrime group claimed responsibility, gaining unauthorized access and causing widespread outages during the critical final exam period for schools and universities across the U.S. and internationally. The breach affected nearly 9,000 educational institutions, with the attackers claiming to have compromised data on up to 275 million users, including students, teachers, and staff. Exposed information includes names, email addresses, student ID numbers, and private messages between students and teachers.</p><p>The Committee on Homeland Security has requested to be briefed on the incident and Instructure&#8217;s remediation steps.</p><p><strong>Why it matters: </strong>This is a top-tier SaaS-concentration risk event &#8212; a single platform compromise exposed data spanning thousands of K&#8211;12 districts and universities at exam time, with attackers defacing login pages to amplify pressure.</p><p><strong>Strategic implications: </strong>Education-sector SaaS has joined healthcare and finance as Tier-1 ransomware/extortion targets. Boards should expect insurance carriers to retighten coverage for EdTech vendors and federal scrutiny of K&#8211;12 cyber resilience requirements to intensify.</p><h2><strong>ShinyHunters Salesforce Campaign Expands; Trellix Source Code Stolen</strong></h2><p>Global real estate services firm Cushman &amp; Wakefield confirmed a vishing-related security breach after both the ShinyHunters and Qilin ransomware groups listed the company on their dark web leak sites. ShinyHunters claimed to have stolen over 500,000 Salesforce records containing personally identifiable information and internal corporate data. The company responded by activating incident response protocols and engaging third-party experts. The attackers issued a ransom demand with a deadline of May 6, threatening to leak the data if not paid.</p><p>Separately, <em>cybersecurity firm Trellix disclosed a data breach after attackers gained access to &#8220;a portion&#8221; of its source code repository.</em></p><p><strong>Why it matters: </strong>Vishing-driven Salesforce compromise has become ShinyHunters&#8217; signature playbook, and Trellix&#8217;s source-code exposure raises supply-chain concerns mirroring the 2024 wave of vendor breaches.</p><p><strong>Strategic implications: </strong>CRM platforms are now the highest-yield exfiltration target in the enterprise. Identity verification at the help-desk layer &#8212; not technical controls alone &#8212; is becoming the decisive control point.</p><h2><strong>Anthropic&#8217;s &#8220;Mythos&#8221; Vulnerability-Discovery AI Triggers Regulatory Response</strong></h2><p><em>Anthropic CEO Dario Amodei has warned that AI has created a narrow window of about six to 12 months for organizations across the world to fix tens of thousands of software vulnerabilities found by its AI model before Chinese AI catches up.</em></p><p>Regulators are responding. <em>The Securities and Exchange Board of India (SEBI) has released an advisory stating that tools like Mythos &#8220;may give rise to heightened risk exposure by enabling identification and potential exploitation of existing vulnerabilities using speed and scale,&#8221; and that it may also introduce concerns relating to data confidentiality, application integrity, and reliability of outputs. SEBI is also establishing a cyber task force to examine cybersecurity risks posed by AI models and devise a mitigation strategy.</em></p><p><strong>Why it matters: </strong>A new asymmetry has emerged: defenders using AI to find bugs are accelerating disclosure faster than enterprises can deploy patches. The &#8220;patch gap&#8221; is the new attack window.</p><p><strong>Strategic implications: </strong>Expect AI-discovery-driven CVE volumes to become a permanent feature of the threat landscape. Organizations that haven&#8217;t automated their patch pipelines should treat 2026 as the year they must &#8212; virtual patching, runtime application self-protection (RASP), and compensating controls are no longer optional.</p><h2><strong>SAP, Fortinet, and Adobe Round Out a Heavy Patch Week</strong></h2><p><em>SAP released May 2026 security updates addressing 15 vulnerabilities across multiple products, including two critical flaws in the Commerce Cloud enterprise-grade e-commerce platform and the S/4HANA ERP suite.</em></p><p><em>Fortinet released security patches for two critical vulnerabilities in FortiSandbox and FortiAuthenticator that could enable attackers to run commands or arbitrary code.</em></p><p>The supply-chain front remained active: <em>hundreds of packages across npm and PyPI have been compromised in a new Shai-Hulud supply-chain campaign delivering credential-stealing malware targeting developers.</em></p><h1><strong>Quantum Computing Corner</strong></h1><p>This week&#8217;s quantum developments materially compress the timeline that underpins post-quantum migration planning.</p><p><strong>JUPITER simulates 50 qubits &#8212; a new world record. </strong><em>Researchers at the J&#252;lich Supercomputing Centre and NVIDIA achieved a major milestone in quantum computing by fully simulating a universal quantum computer with 50 qubits for the first time</em> using Europe&#8217;s first exascale supercomputer.</p><p><em>The achievement surpasses the previous record of 48 qubits, also set by J&#252;lich scientists in 2019 using Japan&#8217;s K computer. Beyond setting a new benchmark, the breakthrough highlights the enormous capabilities of JUPITER and could accelerate the development of future quantum algorithms.</em></p><p><strong>Mobile qubits on silicon. </strong>In a development with major scalability implications, <em>researchers have demonstrated that qubits can physically move across a silicon chip while preserving their fragile quantum states. The findings, published in Nature, show that electron spin qubits embedded in silicon can be shuttled across microscopic distances using precisely controlled electrostatic potentials without losing coherence or computational fidelity.</em></p><p><strong>ETH Zurich stabilizes neutral-atom qubits. </strong><em>Researchers at ETH Zurich took a step closer to quantum supercomputers after achieving a major breakthrough with neutral-atom qubits, making them more stable during operation than ever before, while developing a new type of quantum operation.</em></p><p><strong>Kyoto W-state breakthrough. </strong><em>Scientists in Japan have developed a new way to instantly detect elusive quantum &#8220;W states,&#8221; a major milestone for quantum technology. The breakthrough could help unlock faster quantum communication, teleportation, and powerful new computing systems.</em></p><p><strong>Why this matters for security. </strong>Harvard&#8217;s quantum researchers reiterated earlier this month what the field is now openly acknowledging: <em>&#8220;People initially thought that this sort of fault-tolerant, large-scale, quantum computers would be coming some time by the end of the next decade, and I think it&#8217;s quite likely that actually they will be here &#8212; at least in some form &#8212; by the end of this decade,&#8221; Lukin said. &#8220;So, we&#8217;re at least five, maybe 10 years ahead.&#8221;</em></p><p>The cryptographic implications are concrete. <em>&#8220;Bitcoin could be vulnerable to a quantum computer with only about 25,000 or 30,000 [qubits],&#8221; Aaronson told Discover. &#8220;A year ago, the best estimate would have been in the millions.&#8221; He added that Google&#8217;s findings provide a strong incentive to upgrade to quantum-resistant encryption.</em></p><p><strong>NIST PQC status check. </strong><em>NIST expects the two digital signature standards (ML-DSA and SLH-DSA) and the key-encapsulation mechanism standard (ML-KEM) to provide the foundation for most deployments of post-quantum cryptography. They can and should be put into use now.</em> NIST has set a target of deprecating quantum-vulnerable algorithms by 2035, with high-risk systems expected to transition much earlier.</p><p>Enterprise adoption is uneven but accelerating: <em>major cloud providers including Google, AWS, and Microsoft have implemented PQC in their services. Google has enabled ML-KEM in Chrome for connections to compatible servers. Microsoft has implemented PQC in Azure and Windows updates.</em></p><p>The harvest-now-decrypt-later threat remains the binding constraint. <em>Sophisticated adversaries &#8212; including state-sponsored threat actors &#8212; are already collecting encrypted data today with the intent to decrypt it once quantum computers become available. Sensitive data captured in 2026 could remain encrypted for decades, meaning it will be exposed the moment a capable quantum computer exists.</em></p><h1><strong>What to Watch</strong></h1><ul><li><p><strong>June 26, 2026 Secure Boot deadline. </strong><em>May 12 marked 45 days remaining until the June 26 Secure Boot certificate expiration; June 9 will be the final Patch Tuesday before expiration. The deadline is the absolute cutoff for the original 2011 certificates.</em> Enterprises with large fleets of OEM hardware need to verify trust-anchor rotation now.</p></li><li><p><strong>Oracle&#8217;s first monthly CSPU (May 28). </strong>A real-time test of whether monthly cadence reduces or merely redistributes patch fatigue.</p></li><li><p><strong>PQC certificate availability. </strong><em><a href="http://www.cloudflare.com">Cloudflare </a>expects the first post-quantum certificates to be available in 2026, but not enabled by default. Organizations should prepare for a future flip-the-switch migration to post-quantum signatures.</em></p></li><li><p><strong>ShinyHunters follow-on extortion. </strong>Expect additional Salesforce-tenant victims to surface as the group monetizes its access pipeline.</p></li><li><p><strong>AI vulnerability discovery as regulatory category. </strong>SEBI&#8217;s task force is likely the first of several national regulators to formalize AI-discovery risk frameworks; expect parallel moves from ENISA and <a href="https://www.cisa.gov/">CISA </a>over the summer.</p></li><li><p><strong>HQC standardization. </strong><em>The draft standard incorporating the HQC algorithm is expected in early 2026, with the final in 2027</em> &#8212; security architects designing crypto-agility frameworks should plan for multi-algorithm support.</p></li></ul><h1><strong>Bottom Line</strong></h1><p>Security leaders are now managing two timelines that have begun to converge. The near-term timeline is dominated by AI-accelerated vulnerability disclosure: Microsoft, Oracle, and SAP are collectively pushing record patch volumes, and <a href="https://www.msn.com/en-us/money/technologyinvesting/anthropic-ceo-warns-of-cyber-moment-of-danger-as-ai-exposes-thousands-of-vulnerabilities/ar-AA22rJpT?ocid=finance-verthp-feeds&amp;apiversion=v2&amp;domshim=1&amp;noservercache=1&amp;noservertelemetry=1&amp;batchservertelemetry=1&amp;renderwebcomponents=1&amp;wcseo=1">Amodei&#8217;s six-to-twelve-month warning suggests that vendor disclosure will keep outpacing enterprise remediation capacity throughout 2026</a>. </p><p>The medium-term timeline &#8212; quantum cryptanalytic risk &#8212; has tightened materially this week. JUPITER&#8217;s 50-qubit simulation, mobile silicon qubits, and ETH Zurich&#8217;s stability gains each independently advance the date at which &#8220;cryptographically relevant&#8221; quantum computers become realistic. Harvard&#8217;s own researchers now openly say the field is five to ten years ahead of pre-2024 projections.</p><p>The practical takeaway for CISOs and boards is that crypto-agility and patch-pipeline automation are no longer two separate programs. Both demand the same underlying capabilities: a complete cryptographic and software inventory, automated deployment infrastructure, runtime compensating controls, and governance authority to act in days rather than quarters. </p><p>Organizations that have deferred PQC inventory work on the assumption of a 2030+ horizon should reassess this quarter. The week&#8217;s headline may have been a quiet Patch Tuesday &#8212; but the underlying signals point firmly toward a noisier, faster, and more cryptographically perilous second half of 2026.</p>]]></content:encoded></item><item><title><![CDATA[State of Security | April 2026]]></title><description><![CDATA[MustardTree Partners Monthly Cybersecurity Report]]></description><link>https://blog.mustardtreegroup.com/p/state-of-security-april-2026</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/state-of-security-april-2026</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Sat, 25 Apr 2026 09:03:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6D8O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6D8O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6D8O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6D8O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6D8O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>By Samuel Odekunle, Managing Partner</em></p><div><hr></div><p>April 2026 will be remembered as the month the cybersecurity industry crossed a Rubicon. Anthropic announced an AI model so capable at finding software vulnerabilities that the company refused to release it publicly. Iran-affiliated actors moved from rhetoric to demonstrable disruption of US critical infrastructure. RSA Conference 2026 confirmed that agentic AI security has become the dominant product category in enterprise security. And whilst the industry talked about machines, criminals continued to extract devastating losses from old-fashioned identity compromise.</p><p>The themes converging this month are not new&#8212;but the pace at which they are converging is unprecedented. For security leaders, April marks the point at which the question shifts from &#8220;is this happening?&#8221; to &#8220;are we keeping up?&#8221;</p><h2>Project Glasswing: A Watershed Moment for Cybersecurity</h2><p>On 7 April, Anthropic announced Claude Mythos Preview alongside Project Glasswing&#8212;a coalition of twelve major technology and finance companies including Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, Microsoft, and Nvidia. The headline claim was extraordinary: Mythos has already identified thousands of high-severity zero-day vulnerabilities across every major operating system and web browser. The oldest discovery was a 27-year-old bug in OpenBSD, an operating system widely regarded as among the world&#8217;s most secure. A 17-year-old remote code execution vulnerability in FreeBSD&#8217;s NFS implementation (CVE-2026-4747) was, according to Anthropic, fully autonomously identified and exploited by the model.</p><p>Anthropic&#8217;s decision not to release the model publicly is itself remarkable. The company committed $100 million in usage credits and an additional $4 million in donations to open-source security organisations, restricting access to a vetted group of partners and approximately forty additional organisations maintaining critical software.</p><p>The strategic reasoning is straightforward: AI capabilities have crossed a threshold where defenders need a head start. As Cisco noted in joining the project, &#8220;the old ways of hardening systems are no longer sufficient.&#8221; The question dominating boardroom conversations this month is what happens when these capabilities proliferate beyond actors committed to deploying them safely.</p><p>Three observations matter for security leaders. First, the gap between vulnerability discovery and exploitation has collapsed further&#8212;what once took months now happens in minutes when AI is involved. Second, this favours defenders if they act quickly; finding vulnerabilities for patching purposes is materially easier than chaining them into operational exploits. Third, the proliferation timeline is short. Within a week of Anthropic&#8217;s announcement, OpenAI announced a similarly capable model under similar restrictions. By 22 April, reports emerged that unauthorised users had reportedly gained access to Mythos through a third-party vendor environment.</p><p>The Mythos era has begun whether organisations are ready or not.</p><h2>Iran&#8217;s Escalation: From Rhetoric to Industrial Control Systems</h2><p>The Iran cyber campaign that dominated March&#8217;s report has matured significantly. On 7 April, CISA, FBI, NSA, EPA, DOE, and US Cyber Command issued a joint advisory warning that Iranian-affiliated APT actors have been actively disrupting programmable logic controllers across multiple US critical infrastructure sectors&#8212;including Government Services and Facilities, Water and Wastewater Systems, and Energy.</p><p>The targeting has focused on Rockwell Automation Allen-Bradley PLCs, with Unit 42 tracking the activity as CL-STA-1128 (also known as Cyber Av3ngers or Storm-0784). The attackers have moved beyond their historic focus on Unitronics PLCs&#8212;the same group responsible for the November 2023 attack on the Municipal Water Authority of Aliquippa, Pennsylvania&#8212;to Rockwell devices. This represents a deliberate expansion of capability, with attackers reportedly installing FactoryTalk software on virtual private server infrastructure to enable their exploitation efforts.</p><p>The pattern is clear. Iran lacks symmetric conventional response options against the United States and Israel, so cyberspace becomes the primary theatre of retaliation. The pro-Iranian hacking group Ababil of Minab claimed responsibility for a March hack on the Los Angeles County Metropolitan Transportation Authority, with the transit agency confirming unauthorised activity that forced network restrictions.</p><p>Perhaps most concerning is research from DomainTools Investigations describing activity attributed to Homeland Justice, Karma, and Handala Hack as a &#8220;single, coordinated cyber influence ecosystem&#8221; aligned with Iran&#8217;s Ministry of Intelligence and Security. These personas function as interchangeable operational veneers applied to a consistent underlying capability&#8212;deliberately complicating attribution while maintaining strategic coordination.</p><p>For organisations operating critical infrastructure, the implications are immediate. Internet-exposed PLCs remain a primary attack vector. The basic hygiene measures matter enormously: removing PLCs from direct internet exposure, changing default credentials, segmenting OT networks from IT networks, and implementing strong authentication for remote access. The advisory should be treated as operational guidance, not advisory reading.</p><h2>Stryker&#8217;s Aftermath and the Endpoint Management Reckoning</h2><p>The full scope of March&#8217;s Stryker incident became clearer in April. A single stolen credential, abused by the Iran-linked Handala group through Microsoft Intune, wiped approximately 80,000 devices across the company&#8217;s offices in seventy-nine countries. Hornetsecurity&#8217;s analysis notes that device management platforms are now a tier-one attack surface&#8212;a categorisation that would have seemed alarmist twelve months ago.</p><p>For any organisation running Microsoft Intune, Microsoft Endpoint Configuration Manager, or comparable mobile device management platforms, the questions are uncomfortable but unavoidable. Who holds administrative access? Are those accounts protected with phishing-resistant multi-factor authentication? Do device wipe commands require additional out-of-band authorisation before execution? The blast radius of a compromised MDM administrator account is no longer theoretical&#8212;it is documented across seventy-nine countries.</p><p>The Medusa ransomware compromise of the University of Mississippi Medical Center provides a parallel case study. The attack forced UMMC&#8212;the state&#8217;s only Level I trauma centre and only children&#8217;s hospital&#8212;to shut down 35 clinics, suspend elective surgeries, and lose access to its Epic electronic health records system for nine days. Healthcare remains a high-value target with real patient safety consequences.</p><h2>The Supply Chain Battlefront</h2><p>April brought stark reminders that the supply chain remains the soft underbelly of enterprise security. North Korean threat actors, attributed by Microsoft as Sapphire Sleet and by Google as UNC1069, published two malicious versions of the Axios npm package on 31 March. Axios is one of the most widely used JavaScript HTTP client libraries in existence, with over 70 million weekly downloads. The malicious versions contained an injected dependency that downloaded remote access trojan payloads from North Korean command-and-control infrastructure. The packages were live for approximately three hours before detection and removal&#8212;but the potential reach of even brief exposure in a library this ubiquitous is substantial.</p><p>Vercel disclosed on 19 April that it had identified a security incident involving unauthorised access to its systems, caused by the compromise of Context.ai, a third-party tool. Attackers claimed to have stolen access keys, source codes, API keys, credentials to internal deployments, and database data. By 23 April, Vercel had identified additional compromised customer accounts. The Bitwarden CLI npm package was also compromised in mid-April, with attackers leveraging a compromised GitHub Action in Bitwarden&#8217;s CI/CD pipeline to steal GitHub tokens, SSH keys, environment variables, shell history, and cloud secrets.</p><p>Most strikingly, malicious images were pushed to the official &#8220;checkmarx/kics&#8221; Docker Hub repository, with threat actors managing to overwrite existing tags. The bundled KICS binary was modified to include data collection and exfiltration capabilities not present in the legitimate version&#8212;creating serious risk for teams using KICS to scan infrastructure-as-code files containing credentials.</p><p>The pattern across these incidents is consistent: trusted distribution channels, automated update mechanisms, and CI/CD pipelines have become the preferred entry points. Software composition analysis and provenance verification are no longer optional capabilities.</p><h2>RSA Conference 2026: Agentic AI Takes the Floor</h2><p>RSA Conference 2026, held in late March, set the agenda for the year. The dominant product category was not endpoint detection, cloud security posture management, or traditional SIEM&#8212;it was AI agent security: the tools, frameworks, and identity systems needed to govern autonomous software acting on behalf of humans inside enterprise networks.</p><p>The vendor announcements clustered around three themes: identity (who is the agent?), runtime enforcement (what is it allowed to do?), and detection (when something goes wrong, how do we know?). Cisco extended Zero Trust Access to AI agents through Duo IAM, registering non-human identities and binding them to accountable human owners with time-bound permissions. Microsoft launched Microsoft 365 E7: The Frontier Suite, bundling Copilot, Entra identity services, and Agent 365&#8212;a governance platform for AI agents. CrowdStrike announced the Charlotte AI AgentWorks ecosystem with Anthropic, OpenAI, and others as launch partners.</p><p>The numbers tell the story. Cisco&#8217;s own survey found that 85% of large enterprises are experimenting with AI agents, but only 5% have moved them to production. Research suggests non-human identities already outnumber human users by a factor of seventeen. Gartner predicts 33% of enterprise applications will include agentic AI by 2028, up from less than 1% in 2024.</p><p>Mandiant&#8217;s M-Trends 2026 report, released alongside the conference, captured the operational reality: cybercriminals are increasingly operating like highly-efficient businesses, establishing partnerships that have collapsed the window for defenders to intervene from hours down to twenty-two seconds at initial access points.</p><p>For organisations, the message is unambiguous: identity governance must extend to non-human identities. The traditional model&#8212;where security focuses on human users and &#8220;service accounts&#8221; are an afterthought&#8212;cannot scale to environments where machines outnumber humans by an order of magnitude.</p><h2>April Patch Tuesday and the Vulnerability Cadence</h2><p>Microsoft&#8217;s April 2026 Patch Tuesday was the second-largest on record, addressing 167 vulnerabilities across Windows, Office, SharePoint, and related products. Notable highlights include CVE-2026-32201, a SharePoint Server zero-day actively exploited in the wild, allowing unauthenticated remote attackers to present falsified information within trusted SharePoint environments. CISA added it to the Known Exploited Vulnerabilities catalog and urged immediate patching.</p><p>SAP&#8217;s CVE-2026-27681 (CVSS 9.9) stood out among other vendor patches for its potential to allow arbitrary SQL command execution. Fortinet and Adobe also released critical patches.</p><p>The Zscaler ThreatLabz 2026 VPN Risk Report, released during RSA, found that 51% of organisations experienced a VPN-related security incident in the past twelve months. Only 5% trust their VPN infrastructure to detect and stop AI-enabled threats, and only 6% can deploy a critical VPN patch within twenty-four hours. The latter figure is particularly concerning given that the exploitation window for critical vulnerabilities is now measured in hours, not weeks.</p><h2>Notable Incidents This Month</h2><p><strong>Drift Protocol</strong> lost over $280 million in user assets through an attack discovered on 1 April that had been planned at least six months in advance. The incident underscores how patient and well-resourced cryptocurrency-focused threat actors have become.</p><p><strong>Booking.com</strong> confirmed unauthorised third-party access to reservation information including names, addresses, booking dates, and special requests. The data is now prime fuel for highly targeted phishing campaigns.</p><p><strong>Basic-Fit</strong>, Europe&#8217;s largest gym chain, suffered a cyberattack compromising data of 200,000 members in the Netherlands and exposing bank details of one million members across multiple countries.</p><p><strong>Signature Healthcare Brockton Hospital</strong> in Massachusetts experienced a ransomware attack by the Anubis group, forcing emergency room ambulance diversion and patient care delays.</p><p><strong>Minot, North Dakota Water Treatment Plant</strong> suffered a ransomware attack that forced reversion to manual management processes&#8212;the kind of operational impact that turns cyber incidents into public safety incidents. The FBI launched Operation Winter Shield to combat rising ransomware attacks on public utilities.</p><p>Active ransomware groups this month have included Qilin, ShinyHunters, CoinbaseCartel, and TheGentlemen, with municipal governments, professional services, and manufacturing remaining the primary targets.</p><h2>Strategic Imperatives for May 2026</h2><p>The convergence of AI-augmented vulnerability discovery, geopolitical retaliation against critical infrastructure, and supply chain compromise demands recalibrated priorities:</p><p><strong>Treat the Mythos era as an inflection point.</strong> The capabilities Anthropic has demonstrated will proliferate. Organisations need patch management programmes that can respond in days, not months. The 6% of organisations that can deploy a critical VPN patch within twenty-four hours represent the new minimum standard, not a stretch goal.</p><p><strong>Audit non-human identities ruthlessly.</strong> If non-human identities outnumber human users by seventeen to one&#8212;and your governance focuses primarily on humans&#8212;you have an architectural problem, not a tooling gap. Service accounts, API keys, AI agents, and machine identities require the same lifecycle management as human accounts.</p><p><strong>Disconnect operational technology from the public internet.</strong> The Iranian PLC campaign succeeds because internet-exposed industrial control systems remain depressingly common. This is not a sophisticated attack vector. It is a configuration failure that adversaries have industrialised.</p><p><strong>Verify your software supply chain.</strong> Software composition analysis, package provenance verification, and CI/CD pipeline security are no longer mature-organisation luxuries. The Axios, Vercel, Bitwarden, and Checkmarx incidents this month demonstrate that any of these vectors can compromise downstream organisations regardless of their own security posture.</p><p><strong>Test endpoint management blast radius.</strong> If a single compromised admin account can wipe 200,000 devices across seventy-nine countries, your incident response plan needs to address that scenario explicitly. Phishing-resistant MFA, just-in-time privilege elevation, and out-of-band authorisation for destructive actions are essential.</p><h2>Looking Ahead</h2><p>April 2026 demonstrated that the threat landscape and the defensive capability landscape are evolving at unprecedented pace&#8212;often in the same direction, but not always at the same speed. The same AI capabilities that enable Project Glasswing&#8217;s coalition to find decades-old vulnerabilities will inevitably enable adversaries to find and exploit similar flaws elsewhere. The window is narrow.</p><p>The Iran conflict shows that geopolitical events translate to cyberspace within hours, with consequences extending to organisations far from the kinetic theatre. Critical infrastructure operators&#8212;particularly water, energy, and transit&#8212;should assume targeting is ongoing.</p><p>The supply chain incidents reinforce that perimeters are increasingly meaningless. Your security posture is the product of every organisation that touches your software, your data, and your identity systems. Trust must be earned through verification, not extended by default.</p><p>Most importantly, the agentic AI era has arrived in production. Whether your organisation is prepared to govern autonomous systems is no longer a strategic question for 2027 planning&#8212;it is an operational question for May.</p><p>The defenders who thrive will be those who recognised these shifts early and acted with conviction. The clock is no longer ticking quietly.</p><div><hr></div><p><em>Samuel Odekunle is Managing Partner at MustardTree Partners, specialising in cybersecurity strategy, identity and access management, and digital transformation.</em></p><p><em>State of Security is published monthly. Subscribe for the latest analysis on the evolving threat landscape.</em></p><p></p><h2></h2>]]></content:encoded></item><item><title><![CDATA[Three to One: The Identity Ratio No One Is Governing]]></title><description><![CDATA[Machine identities now outnumber humans by three to one &#8212; and almost no board knows who owns the risk.]]></description><link>https://blog.mustardtreegroup.com/p/three-to-one-the-identity-ratio-no</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/three-to-one-the-identity-ratio-no</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Fri, 17 Apr 2026 06:21:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!RHMx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RHMx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RHMx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png 424w, https://substackcdn.com/image/fetch/$s_!RHMx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png 848w, https://substackcdn.com/image/fetch/$s_!RHMx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png 1272w, https://substackcdn.com/image/fetch/$s_!RHMx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RHMx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png" width="1456" height="746" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:746,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2222145,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.mustardtreegroup.com/i/194485164?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RHMx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png 424w, https://substackcdn.com/image/fetch/$s_!RHMx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png 848w, https://substackcdn.com/image/fetch/$s_!RHMx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png 1272w, https://substackcdn.com/image/fetch/$s_!RHMx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0c115f0-d14d-4602-afe0-d271c3198a88_1739x891.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>By 2026, non-human identities &#8212; APIs, bots, service accounts, IoT devices, AI agents, CI/CD tokens, container workloads &#8212; outnumber human users in most enterprises by roughly three to one. In heavily automated environments, the ratio climbs to ten to one or higher. Every one of those identities has credentials, permissions, and access to something a person would need a manager&#8217;s sign-off to touch.</p><p>If you run a risk committee, an audit committee, or a board, the implication is uncomfortable: the majority of your organisation&#8217;s identity surface is not human, is not reviewed on a joiner-mover-leaver cycle, and is almost certainly not reflected in your cyber risk register.</p><h3>Why the governance model breaks</h3><p>Human identity governance is a broadly solved problem. We have decades of precedent. HR initiates an account when a person is hired. Access is reviewed quarterly. Permissions change when people move teams. Accounts are disabled on the last day of employment. Annual recertifications catch the drift. Auditors tick boxes. The board sees a dashboard.</p><p>Non-human identities fit none of this.</p><p>A service account is created by a developer, often in a rush, often with broader permissions than needed, often without a lifecycle owner. When the developer leaves, the account doesn&#8217;t. When the application it serves is decommissioned, the account rarely is. When a contractor spins up an integration for a six-week project, it lingers for six years. There is no HR system for machines. There is no quarterly access review. There is no joiner-mover-leaver workflow unless someone has built one deliberately.</p><p>The result is a population of credentials larger than your workforce, more privileged than most employees, and governed by approximately nobody.</p><h3>How attackers are exploiting the gap</h3><p>The attack chain I have seen most often this year goes roughly like this. An adversary targets a developer &#8212; increasingly through recruitment fraud, where a fake job posting or trojanised coding challenge delivers malware. The developer&#8217;s workstation yields their personal GitHub or GitLab token. That token grants access to internal code repositories. Inside those repositories are hardcoded credentials, API keys, and service account tokens &#8212; the machine identities. From there, the attacker moves laterally using those credentials, which typically have far more privilege than the compromised developer.</p><p>The developer is the foothold. The non-human identities are the payload.</p><p>This is not a theoretical threat model. Identity security researchers have documented the pattern through multiple incidents in the past twelve months. In most cases, the breached organisations had strong human IAM &#8212; MFA, SSO, conditional access &#8212; and catastrophic machine identity hygiene. The perimeter that mattered was the one they had not measured.</p><h3>The disclosure question most boards haven&#8217;t asked</h3><p>There is a second, quieter governance concern.</p><p>Since the SEC&#8217;s November 2025 decision to terminate its long-running SolarWinds CISO litigation, the Commission has refocused on <em>material misrepresentations</em> in cyber disclosures that harm investors. That is a narrower but sharper standard. The accuracy of your Form 8-K cyber disclosures &#8212; and what your audit committee knew when they approved them &#8212; is now a live legal question.</p><p>If a material breach originates from a machine identity your organisation cannot account for, and your public disclosure describes your identity posture in terms of your human workforce, you have a problem that a regulator can reach. The board cannot comfortably rely on &#8220;we didn&#8217;t know&#8221; if the inventory was never commissioned in the first place.</p><p>This is why I treat non-human identity governance as a board-level disclosure issue, not just an operational IAM issue.</p><h3>Where governance needs to catch up</h3><p>Three shifts are required, and the first two are structural rather than technical.</p><p><strong>First, non-human identities need a named owner.</strong> Every service account, API key, and machine credential needs a named human accountable for its lifecycle &#8212; provisioning, permissions, rotation, and decommissioning. The failure mode I see repeatedly is &#8220;owned by the team&#8221;, which in practice means owned by nobody. Attach each identity to a person, and when that person leaves, reassign it explicitly. This is the single highest-leverage change available to most organisations, and it costs nothing but discipline.</p><p><strong>Second, NHIs need to appear on the risk register in language the board understands.</strong> Not &#8220;we have 11,000 service accounts&#8221; but &#8220;42% of those accounts have privileged access, and 18% have not been authenticated in over 12 months.&#8221; The board&#8217;s job is to judge whether that level of unmeasured privilege is acceptable. They cannot do that with a headcount figure alone.</p><p><strong>Third, the joiner-mover-leaver process needs a machine analogue.</strong> When an application is decommissioned, its identities should be decommissioned with it. When a developer leaves, the credentials they created should be reviewed, not only the ones assigned to them. This is dull, unglamorous governance work. It is also what the SEC, the ICO, and your cyber insurer will ask about after an incident.</p><h3>Questions for your next risk committee</h3><p>A handful of questions worth raising at your next risk or audit committee meeting.</p><p>Do we have an inventory of non-human identities, and when was it last verified independently? If the answer is &#8220;the identity team maintains one,&#8221; that is different from an audit.</p><p>Who owns the lifecycle of any given machine identity &#8212; is there a named person, or a team?</p><p>How many of our machine identities have privileged access, and how many have been dormant for more than 90 days?</p><p>If a breach originated from a service account tomorrow, could our disclosure accurately describe our identity governance posture?</p><p>When did the board last see an identity figure that included non-human identities?</p><p>The answer to that last question, in my experience, is almost always &#8220;never.&#8221;</p><p>That is the governance gap. Closing it does not require new technology. It requires the board to ask for a number it has not previously asked for, and to keep asking until someone owns it.</p>]]></content:encoded></item><item><title><![CDATA[State of Security | March 2026]]></title><description><![CDATA[MustardTree Partners Monthly Cybersecurity Report]]></description><link>https://blog.mustardtreegroup.com/p/state-of-security-march-2026</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/state-of-security-march-2026</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Thu, 26 Mar 2026 11:17:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6D8O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6D8O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6D8O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6D8O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:822023,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.mustardtreegroup.com/i/192194628?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6D8O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6D8O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78a9b888-5fbf-45d8-b240-5b53bbd56a2d_4576x3051.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>By Samuel Odekunle, Managing Partner</em></p><div><hr></div><p>The cybersecurity landscape of March 2026 has been irrevocably shaped by kinetic conflict. On 28 February, the United States and Israel launched coordinated strikes against Iran&#8212;Operation Epic Fury and Operation Roaring Lion&#8212;and cyberspace became the parallel theatre of war. What has unfolded since represents the most intensive period of state-linked cyber warfare since the Russia-Ukraine conflict, with operations spanning critical infrastructure, financial systems, communications networks, and the cognitive domain itself.</p><p>For organisations operating in this environment, the implications extend far beyond geopolitics. The targeting patterns are broad and opportunistic. Sectors with no direct connection to the conflict are being hit simply because they present opportunity. The rules of engagement have shifted, and every security leader needs to understand what that means for their organisation.</p><h2>The Four-Hour Cyber War</h2><p>Before a single missile struck Iranian soil, cyber operations had already begun. General Dan Caine, Chairman of the Joint Chiefs of Staff, confirmed that US Cyber Command was among the &#8220;first movers&#8221; in Operation Epic Fury. Coordinated space and cyber operations disrupted Iranian communications and sensor networks, leaving the adversary &#8220;without the ability to see, coordinate, or respond effectively.&#8221;</p><p>The sophistication of the pre-kinetic cyber campaign was extraordinary. Israeli intelligence had spent years building what sources describe as a comprehensive intelligence architecture focused on Tehran. Real-time feeds from compromised traffic cameras provided pattern-of-life analysis. Mobile phone networks had been &#8220;deeply penetrated,&#8221; allowing targeting intelligence that pinpointed where senior officials&#8217; protection details parked their vehicles. When the moment came, a cyber operation disrupted mobile communications near the Supreme Leader&#8217;s compound, preventing warnings from reaching his security team.</p><p>Perhaps most striking was the compromise of BadeSaba, a popular Iranian prayer app with over five million downloads. Users received push notifications reading &#8220;Help has arrived&#8221; and messages urging military personnel to defect. The app had been targeted not merely for psychological warfare, but for its intelligence value&#8212;the application requests location access for accurate prayer times, making its user data extraordinarily valuable for targeting.</p><p>Within four hours of strikes beginning, Iran imposed a near-total internet blackout. Connectivity dropped to between one and four percent, remaining degraded for over sixty hours. This was a combination of physical strikes on data centres and what Israeli sources described as &#8220;the largest cyberattack in history.&#8221;</p><h2>Asymmetry in Cyberspace</h2><p>The opening days revealed a stark disparity in cyber capabilities. Iran lacks symmetric conventional response options against the United States and Israel&#8212;which is precisely why the regime has historically relied on cyber operations and proxy actors as instruments of response.</p><p>The internet blackout, while limiting information flow out of Iran, also severely constrained Iranian state actors&#8217; ability to coordinate sophisticated cyberattacks. Unit 42 at Palo Alto Networks initially assessed that threat activity from nation-state groups within Iran would be mitigated in the near term due to limited connectivity and degraded command structures.</p><p>That assessment proved optimistic. By early March, security researchers were tracking over sixty active threat groups aligned with this conflict&#8212;fifty-three operating on the pro-Iranian side. Activity accelerated sharply, and contrary to initial assessments that Iranian cyber capabilities had been degraded by kinetic strikes, adversary operations intensified rather than diminished.</p><p>The explanation lies in geography. Pro-Iranian groups operate from Southeast Asia, Pakistan, Iraq, and elsewhere in the Middle East. The Cyber Islamic Resistance claimed responsibility for over six hundred distinct attacks in the first two weeks, operating across more than one hundred Telegram channels. NoName057(16), a pro-Russian hacktivist group that previously targeted Ukraine, has teamed up with Iranian hacktivists to target Israeli defence and municipal organisations.</p><h2>Stryker: The Canary in the Coal Mine</h2><p>On 11 March, American medical technology company Stryker confirmed a cyberattack had disrupted its global network. Employees across the company&#8217;s offices found the logo of Handala, an Iran-linked hacking group, displayed on their login pages. The attack targeted Stryker&#8217;s Microsoft environment, and Handala claimed to have exploited Microsoft Intune to remotely wipe more than 200,000 devices across seventy-nine countries.</p><p>The group stated the operation was retaliation for a missile strike on a school in Minab, Iran. Stryker filed an 8-K with the SEC on 23 March confirming the incident was contained, but the implications are profound. This was not espionage. This was destructive retaliation against civilian infrastructure&#8212;a medical device company&#8212;executed through compromised enterprise management systems.</p><p>CISA has since flagged rising threats to endpoint management systems, urging organisations to recognise that the tools designed to defend networks are often their weakest link. Edge devices, routers, firewalls, VPN gateways&#8212;critical yet frequently neglected&#8212;have become prime targets.</p><p>The targeting patterns in this conflict are instructive for every organisation. Sectors facing elevated exposure include energy and utilities, financial services (particularly institutions with Middle Eastern operations), aerospace and defence, healthcare, cloud and telecommunications infrastructure, and critical national infrastructure broadly&#8212;including water utilities, where pro-Iranian groups have claimed access to operational control systems.</p><h2>The Institutional Response</h2><p>On 23 March, the State Department formally launched the Bureau of Emerging Threats, a unit designed to combat cyberattacks, AI weaponisation, space threats, and other advanced challenges from adversaries including Iran, China, Russia, and North Korea. The bureau comprises five divisions: the Office of Cybersecurity, the Office of Critical Infrastructure Security, the Office of Disruptive Technology, the Office of Space Security, and the Office of Threat Assessment.</p><p>The timing is significant. This represents a shift toward anticipatory rather than reactive diplomacy&#8212;recognition that emerging technologies are now central to the modern arms race. The bureau reports to the Under Secretary for Arms Control and International Security, signalling that bits, bytes, and orbital assets are now viewed as equivalent to conventional weapons in strategic importance.</p><p>However, the domestic cyber defence posture presents challenges. CISA has lost staffers focused on regional outreach, infrastructure security, and strategic planning. The Critical Infrastructure Partnership Advisory Council has been shuttered. Funding for the Multi-State Information Sharing and Analysis Center has been eliminated. Schools, hospitals, and state governments report a stark difference in the availability of CISA services.</p><p>The irony is acute: at the precise moment when state-aligned cyber threats are escalating, the mechanisms needed to support critical infrastructure partners have been hollowed out. The essential question for 2026 is whether institutional capacity can be rebuilt faster than threat actors can exploit the gaps.</p><h2>Agentic AI: The Threat Multiplier Arrives</h2><p>While the Iran conflict dominates headlines, a parallel transformation is reshaping the threat landscape at a structural level. Agentic AI&#8212;autonomous systems capable of planning, deciding, and executing multi-step actions toward specific goals&#8212;has moved from research prototype to operational deployment on both sides of the adversarial divide.</p><p>Unlike generative AI, which requires human prompting, agentic AI can orchestrate autonomous attack chains. It automates reconnaissance, phishing generation, credential testing, and infrastructure rotation without direct human control. This dramatically lowers the cost of experimentation and increases the speed of exploitation.</p><p>Barracuda Networks documented an agentic-style AI attack targeting FortiGate firewalls in February, where autonomous agents gained access and conducted reconnaissance on victim networks. Flashpoint&#8217;s 2026 Global Threat Intelligence Report identifies agentic AI operationalisation as one of four converging forces reshaping the global threat landscape, alongside identity as the primary exploit vector, compression of the exploitation window, and the continued blurring between cybercrime and nation-state operations.</p><p>For defenders, agentic AI represents both threat and opportunity. EY&#8217;s Cybersecurity Roadmap Study found that 96% of senior security leaders view AI-enabled attacks as a significant threat, with 48% estimating that AI-powered attacks accounted for incidents their organisation experienced in the past year. Yet 97% also agree their competitive advantage will be directly tied to the maturity of their agentic AI cybersecurity defences.</p><p>The number of security leaders expecting agentic AI to largely run key functions is set to double within two years: APT detection rising from 30% to 62%, real-time fraud detection from 32% to 58%, and identity and access management from 23% to 51%. The AI arms race has moved from prediction to operational reality.</p><h2>The Ransomware Ecosystem Adapts</h2><p>Ransomware groups made less money in 2025 despite a 47% increase in publicly reported attacks. This declining profitability is driving tactical evolution that organisations should prepare for in 2026.</p><p>First, ransomware-as-a-service operations are bundling DDoS capabilities to increase pressure on victims. The newly formed Chaos ransomware group exemplifies this trend, providing DDoS capabilities to all affiliates. When encryption alone doesn&#8217;t yield payment, sustained service disruption becomes an additional lever.</p><p>Second, insider recruitment is accelerating. There has been a notable increase in ransomware groups working with native English speakers to recruit corporate insiders. If workforce reductions at major companies persist, this trend will intensify. The most public example came when a ransomware group attempted to recruit a BBC reporter, but this represents only the visible tip of a much larger phenomenon.</p><p>Third, the ransomware ecosystem is globalising. Recorded Future predicts 2026 will mark the first year that new ransomware actors operating outside Russia outnumber those within it. This doesn&#8217;t indicate a decline in Russian-based operations&#8212;it reflects how dramatically the global ecosystem has expanded.</p><p>March&#8217;s most active groups include DragonForce and World_Leaks, each responsible for multiple daily compromises, followed by Akira and Qilin. The primary targets remain Professional Services and Manufacturing sectors, with the United States experiencing the majority of reported compromises.</p><h2>Critical Vulnerabilities: March 2026</h2><p>The exploitation window continues to compress, with mass exploitation of zero-day vulnerabilities occurring in as little as twenty-four hours after disclosure. Key vulnerabilities demanding immediate attention this month include:</p><p><strong>BeyondTrust Remote Support (CVE-2026-1731):</strong> A pre-authentication remote code execution flaw actively exploited in ransomware campaigns. The speed at which this vulnerability moved from disclosure to active exploitation&#8212;less than two weeks&#8212;demonstrates that patch windows are continuing to shrink. Organisations running self-hosted BeyondTrust deployments that didn&#8217;t act within days should treat this as a potential compromise scenario.</p><p><strong>VMware Aria Operations (CVE-2026-22719):</strong> A command injection vulnerability rated CVSS 8.1, allowing unauthenticated attackers to execute arbitrary commands. CISA added this to the Known Exploited Vulnerabilities catalog and set a federal remediation deadline of 24 March.</p><p><strong>Cisco Secure Firewall Management Center (CVE-2026-20131):</strong> A critical remote code execution flaw being actively exploited by the Interlock ransomware group since January. Amazon confirmed active exploitation on 18 March. This flaw allows unauthenticated attackers to execute arbitrary Java code with root privileges.</p><p><strong>Microsoft SharePoint (CVE-2026-20963):</strong> A deserialization vulnerability allowing authorised attackers to execute code over a network. CISA set a remediation deadline of 21 March.</p><p>The Tycoon 2FA takedown in early March&#8212;a coordinated disruption involving Proofpoint, Microsoft, Europol, and international law enforcement that seized 330 control panel domains&#8212;represents positive momentum. However, adversary-in-the-middle phishing-as-a-service platforms remain prolific, and organisations should not assume the ecosystem has been permanently degraded.</p><h2>Strategic Imperatives for Q2 2026</h2><p>The convergence of kinetic conflict, agentic AI operationalisation, and persistent ransomware activity creates a threat environment that demands immediate executive attention:</p><p><strong>Assume targeting is opportunistic, not strategic.</strong> Organisations with no direct connection to the Iran conflict are being hit simply because they present opportunity. Sector, geography, and political alignment matter less than vulnerability. If you&#8217;re accessible, you&#8217;re a target.</p><p><strong>Audit endpoint management and edge infrastructure immediately.</strong> The Stryker incident demonstrates that enterprise management systems are now prime targets. Intune, SCCM, VPN concentrators, firewalls&#8212;these tools carry elevated privileges and wide network access. A single vulnerability hands attackers a skeleton key.</p><p><strong>Compress patch cycles to days, not weeks.</strong> The exploitation window for critical vulnerabilities has collapsed to under two weeks in many cases. If your vulnerability management programme operates on monthly cycles, you are already behind adversary timelines.</p><p><strong>Prepare for agentic threats.</strong> Traditional security tools were built to detect anomalies in human behaviour. An agent that executes perfectly ten thousand times in sequence looks normal to these systems&#8212;but that agent might be executing an attacker&#8217;s will. Behaviour-based detection and strong identity controls remain effective, but must be applied consistently.</p><p><strong>Treat supply chain risk as operational risk.</strong> The more robust technical perimeters become, the more attractive human targets and third-party relationships become. Your security posture is ultimately defined by the weakest link in your supply chain.</p><h2>Looking Ahead</h2><p>March 2026 will be remembered as the month cyber warfare became inseparable from kinetic conflict at scale. The Iran campaign demonstrated capabilities that should concern every organisation: real-time intelligence from compromised civilian infrastructure, weaponised consumer applications, and destructive attacks against healthcare companies executed as retaliation for military strikes.</p><p>The State Department&#8217;s Bureau of Emerging Threats signals institutional recognition that emerging technologies are now weapons of statecraft. Whether that recognition translates to operational capability fast enough to counter accelerating threats remains an open question.</p><p>For security leaders, the imperative is clear: the threat environment has changed. Geopolitical conflict now directly affects organisations that considered themselves outside the blast radius. The defenders who thrive in 2026 will be those who recognise that assumption and act accordingly.</p><p>The parallel wars&#8212;kinetic and digital&#8212;are now one.</p><div><hr></div><p><em>Samuel Odekunle is Managing Partner at MustardTree Partners, specialising in cybersecurity strategy, identity and access management, and digital transformation.</em></p><p><em>State of Security is published monthly. Subscribe for the latest analysis on the evolving threat landscape.</em></p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[You Don’t Need to Code to Work in Tech]]></title><description><![CDATA[The doors into the technology industry are wider than they&#8217;ve ever been &#8212; and most people still don&#8217;t know they&#8217;re open.]]></description><link>https://blog.mustardtreegroup.com/p/you-dont-need-to-code-to-work-in</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/you-dont-need-to-code-to-work-in</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Tue, 17 Mar 2026 13:03:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!j8NE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j8NE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j8NE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg 424w, https://substackcdn.com/image/fetch/$s_!j8NE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg 848w, https://substackcdn.com/image/fetch/$s_!j8NE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!j8NE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j8NE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg" width="1307" height="744" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:744,&quot;width&quot;:1307,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:644901,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.mustardtreegroup.com/i/190913843?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j8NE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg 424w, https://substackcdn.com/image/fetch/$s_!j8NE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg 848w, https://substackcdn.com/image/fetch/$s_!j8NE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!j8NE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1ecaf453-ed77-4c48-86a8-c906ceb70f81_1307x744.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Let me start with a confession.</p><p>I have a law degree. Not computer science. Not software engineering. An LLB from the University of Buckingham, with modules in contract law, tort, and constitutional law. And yet here I am, over twenty years into a career in enterprise cybersecurity &#8212; leading identity and access management programmes for several both public and private sector clients, building SaaS products, advising on governance frameworks, and writing about emerging threats for an audience of CISOs and security architects.</p><p>Nobody handed me a technical certificate at the door.</p><p>I tell you that not to be self-promotional, but because the number one myth holding capable, intelligent people back from the technology sector is the belief that you need a technical background to get in. You don&#8217;t. What you need is clarity about where your existing skills are actually valuable &#8212; and the willingness to learn enough of the language to operate fluently in technical spaces.</p><p>In 2026, that opportunity has never been larger. And some of the most exciting doors are ones that barely existed five years ago.</p><div><hr></div><h2>Why the Tech Industry Needs People Who Aren&#8217;t Technologists</h2><p>Here&#8217;s something the industry doesn&#8217;t say loudly enough: technology is increasingly failing because of problems that technology cannot solve.</p><p>Projects run over budget because no one translated the technical requirements into business language clearly enough. Products get built that nobody wants because the people who understand the users weren&#8217;t in the room when decisions were made. AI systems get deployed that no one can adequately govern or explain because the people who understand regulation, ethics, and accountability weren&#8217;t involved until it was too late. Security strategies get signed off that look impressive on paper but don&#8217;t reflect how the organisation actually works &#8212; because the people who wrote them didn&#8217;t understand the operational context.</p><p>These are people problems. Communication problems. Governance problems. Strategy problems.</p><p>Which means they are precisely the kinds of problems that people coming from law, finance, healthcare, teaching, communications, project management, social sciences, and a dozen other non-technical backgrounds are often uniquely positioned to solve.</p><p>The technology industry doesn&#8217;t just need more engineers. It needs more people who can sit between the technical and the human &#8212; and make sense of both.</p><div><hr></div><h2>The Roles That Don&#8217;t Require You to Write a Line of Code</h2><h3>Business Analysis</h3><p>This is one of the most underrated entry points into tech, and one of the most natural pivots for people coming from operational, finance, or consultancy backgrounds. Business analysts are essentially translators &#8212; they sit between what a business needs and what a technical team builds, and they make sure those two things are actually aligned.</p><p>Strong analytical thinking, the ability to ask the right questions, document complex requirements clearly, and hold a room of stakeholders together &#8212; these are the skills. The technical vocabulary can be learned. The instinct for structured problem-solving usually can&#8217;t.</p><p>If you&#8217;ve managed projects, written reports, run process improvement initiatives, or spent time in a role where you had to take messy information and make it legible &#8212; business analysis will feel like home.</p><h3>Product Management</h3><p>Product management is arguably the most coveted non-technical role in tech, and for good reason. Product managers own the vision and direction of a product. They decide what gets built, in what order, and why. They speak to customers, interpret data, manage stakeholders, write roadmaps, and ultimately take accountability for whether a product succeeds or fails.</p><p>It&#8217;s one of the highest-leverage roles in any technology company &#8212; and some of the best product managers I&#8217;ve encountered came from backgrounds in education, journalism, healthcare, and the law. The common thread isn&#8217;t technical expertise; it&#8217;s the ability to hold complexity without collapsing it prematurely, and to make decisions with incomplete information.</p><h3>Cybersecurity &#8212; Especially GRC</h3><p>I&#8217;m going to spend a moment on this one because it&#8217;s close to my world, and the talent shortage here is genuinely acute.</p><p>Governance, Risk, and Compliance (GRC) within cybersecurity is a discipline that sits almost entirely in the intersection of regulation, policy, process, and human behaviour. You need to understand frameworks like ISO 27001, NIST, and the UK Cyber Essentials scheme. You need to be able to write risk assessments, conduct audits, manage policies, and translate regulatory obligations into operational controls. You need to be able to communicate risk clearly to boards who don&#8217;t understand technical jargon.</p><p>None of that requires you to configure a firewall or write a security script. It requires rigour, attention to detail, legal and regulatory literacy, and the ability to build governance structures that work in practice rather than just looking good in a document.</p><p>People with backgrounds in law, compliance, finance, and audit are natural fits. The technical fluency you need can be built incrementally &#8212; the conceptual foundation is already there.</p><h3>Technical Writing and UX Writing</h3><p>Every piece of software has documentation. Most of it is terrible. The people who can write clearly, empathetically, and precisely about technical subjects &#8212; translating complex functionality into language that real users can follow &#8212; are genuinely in demand across the technology sector, including in AI companies, developer tool companies, and large enterprise software vendors.</p><p>UX writing is the specific discipline of writing the microcopy inside products: the button labels, error messages, onboarding prompts, and instructional text that determine whether a user feels guided or lost. It sounds small. It&#8217;s actually the difference between a product people adopt and one they abandon.</p><p>If you have a background in communications, journalism, English, or any discipline that trained you to write with clarity and precision, these pathways are wide open.</p><h3>Customer Success and Solutions Engineering</h3><p>Enterprise technology is sold, implemented, and supported by people &#8212; not just code. Customer Success Managers work with enterprise clients to ensure they&#8217;re getting value from the products they&#8217;ve purchased. They need to understand the product deeply, understand the client&#8217;s business, and build relationships that prevent churn and enable expansion.</p><p>Solutions Engineers (sometimes called Pre-Sales or Sales Engineers) work at the intersection of sales and technical depth &#8212; they help prospective clients understand how a product would solve their specific problems. The best ones come from backgrounds where they&#8217;ve had to quickly understand complex domains and communicate them credibly under pressure.</p><p>These roles can pay extremely well in enterprise SaaS, and they reward people skills, business acumen, and domain expertise as much as &#8212; often more than &#8212; purely technical credentials.</p><div><hr></div><h2>The Emerging Spaces: Where the Next Wave of Opportunity Lives</h2><h3>AI &#8212; But Not the AI You&#8217;re Thinking Of</h3><p>When most people hear &#8220;AI jobs,&#8221; they imagine machine learning engineers running neural networks. And yes, that market is competitive, technical, and requires specialist education.</p><p>But the AI economy is generating a much larger ecosystem of roles that don&#8217;t look like that at all.</p><p><strong>AI Product Managers</strong> are needed to define what AI-powered products should do, who they serve, and how they should behave &#8212; including how to handle failure, bias, and edge cases. This is a deeply human and strategic role.</p><p><strong>AI Trainers and Evaluators</strong> &#8212; sometimes called RLHF specialists or Red Teamers &#8212; are people who test AI systems, identify where they fail, and provide feedback that shapes their behaviour. Accuracy, critical thinking, and domain expertise matter far more than coding ability here.</p><p><strong>AI Ethics and Governance Specialists</strong> are arguably the fastest-growing adjacent role category. The EU AI Act is now in force. The UK is developing its own regulatory framework. Every company deploying AI at scale needs people who can navigate the compliance obligations, define acceptable use policies, conduct impact assessments, and build accountability mechanisms around automated systems.</p><p>Lawyers. Policy analysts. Social scientists. Ethicists. Compliance professionals. The technology industry desperately needs your perspective here &#8212; and most of the people making decisions in this space right now are doing so without it.</p><p><strong>Prompt Engineers and AI Workflow Designers</strong> &#8212; designing the way AI systems receive and process instructions, and how they&#8217;re integrated into organisational workflows &#8212; is a discipline that rewards clear thinking, an understanding of human communication, and a systematic approach to problem design. You don&#8217;t write the AI. You architect how people and teams interact with it.</p><h3>Quantum Computing &#8212; The Long Game</h3><p>Quantum is earlier stage than AI, and I want to be honest about that. Most quantum computing roles today are still heavily research-oriented and do require deep technical backgrounds. But the industry is maturing, and a new category of supporting roles is beginning to emerge that looks different from the research lab.</p><p><strong>Quantum Strategy and Policy</strong> roles are being created by governments, financial institutions, and defence contractors who need people who can assess the strategic implications of quantum technology &#8212; for cryptography, for national security, for supply chain resilience &#8212; without necessarily being able to operate the hardware themselves. McKinsey projects that only half of the quantum jobs that will exist in the coming decade may be filled due to talent shortages. The people who position themselves now &#8212; building conceptual literacy in post-quantum cryptography, quantum risk, and quantum policy &#8212; will have a significant first-mover advantage.</p><p><strong>Post-Quantum Cryptography (PQC) Transition</strong> is perhaps the most immediately relevant opportunity for people with cybersecurity governance and compliance backgrounds. Organisations across financial services, government, and critical infrastructure are beginning the process of migrating their cryptographic systems to quantum-resistant standards. This is a governance and programme management challenge as much as a technical one. NIST finalised its PQC standards in 2024. The migration timelines are being set now. The people who lead those programmes will need to understand the risk landscape, engage with regulators, manage vendor relationships, and communicate complex technical transitions to boards.</p><p>That is not a purely technical skill set. It&#8217;s a hybrid one. And the window to develop it is open right now, before everyone else arrives.</p><h3>GRC for Emerging Technologies</h3><p>Regulation is following technology at an unprecedented pace. The EU AI Act, the UK Cyber Resilience framework, DORA, NIS2, the Cyber Security and Resilience Bill &#8212; organisations across every regulated sector are navigating a landscape of compliance obligations that most of their internal teams are not equipped to interpret or implement.</p><p>People with legal training, financial services compliance experience, public policy backgrounds, or even theological ethics (the principles translate further than you&#8217;d think) can move into technology governance roles and immediately contribute in ways that pure technologists cannot.</p><p>This is a space where your existing expertise isn&#8217;t a liability you need to overcome. It&#8217;s the asset.</p><div><hr></div><h2>The Practical Question: How Do You Actually Make the Move?</h2><p>A few things I&#8217;d say from experience, watching people make this transition well and watching others get stuck.</p><p><strong>Stop waiting until you feel ready.</strong> The people who successfully move into tech don&#8217;t wait until they know enough. They move into adjacent roles that stretch them, learn on the job, and build technical vocabulary through proximity and practice. Readiness is a horizon &#8212; it keeps moving.</p><p><strong>Get the certification, not the degree.</strong> For most non-technical routes into tech, professional certifications are worth more than a second degree. CompTIA Security+ for cybersecurity fundamentals. The BCS Business Analysis certificate. The IAPP certifications for privacy and AI governance. The CISMP for information security management. These are relatively accessible, widely recognised, and demonstrate intentional commitment to the field.</p><p><strong>Learn the language without needing to speak it fluently.</strong> You don&#8217;t need to understand how OAuth 2.0 works mechanically. But you do need to understand what it does, why it matters, and how to have a conversation with a developer about it. Conceptual literacy &#8212; understanding enough to ask the right questions and contribute meaningfully to technical decisions &#8212; is a realistic and achievable goal.</p><p><strong>Find the translation role.</strong> The most successful lateral movers into tech are the ones who don&#8217;t try to compete with career technologists on technical ground. They find the space where their background gives them an advantage &#8212; the boardroom, the client relationship, the regulatory conversation, the governance framework &#8212; and they become indispensable there.</p><p><strong>Build in public.</strong> Write about what you&#8217;re learning. Comment thoughtfully in LinkedIn conversations about the topics you&#8217;re developing expertise in. Publish your thinking. The technology sector &#8212; especially in cybersecurity, AI governance, and product &#8212; is a space where public intellectual presence creates genuine opportunity. Recruiters find people this way. Collaborators find people this way. Clients find people this way.</p><div><hr></div><h2>A Word to Anyone Who Thinks It&#8217;s Too Late</h2><p>I have met people who moved into cybersecurity governance in their forties after careers in policing. I know people who moved into product management after years in teaching. I&#8217;ve seen former journalists build entire careers in technical writing and UX. I&#8217;ve watched compliance professionals become the most valued people in AI risk conversations precisely because nobody else in the room understood the regulatory landscape they&#8217;d spent a decade navigating.</p><p>The technology sector is young enough, and moving fast enough, that experience from elsewhere is almost always relevant somewhere. The question is never whether your background has value. The question is where that value lands.</p><p>In 2026, the answer to that question is: more places than ever.</p><p>The doors are open. They just don&#8217;t always look like the ones you&#8217;ve been told to walk through.</p><div><hr></div><p><em>Sam is a Senior Cybersecurity Consultant and IAM specialist, Founding Partner at MustardTree Group, and writer on technology, governance, and emerging cyber risk. </em></p>]]></content:encoded></item><item><title><![CDATA[The API Security Problem No One Is Governing]]></title><description><![CDATA[You authenticated. You&#8217;re still getting breached. Here&#8217;s why &#8212; and what the boardroom isn&#8217;t hearing.]]></description><link>https://blog.mustardtreegroup.com/p/the-api-security-problem-no-one-is</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/the-api-security-problem-no-one-is</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Wed, 11 Mar 2026 22:10:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mYIk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mYIk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mYIk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!mYIk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!mYIk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!mYIk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mYIk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png" width="1456" height="794" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:9292127,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.mustardtreegroup.com/i/190669106?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mYIk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png 424w, https://substackcdn.com/image/fetch/$s_!mYIk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png 848w, https://substackcdn.com/image/fetch/$s_!mYIk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!mYIk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8a6095b-0b4c-4874-b4c8-808de647c518_2816x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There&#8217;s a particular kind of security failure that keeps me up at night. Not the dramatic zero-day. Not the nation-state actor deploying exotic tooling. The one I&#8217;m talking about is quieter, more insidious, and in 2026, dramatically more common: the attacker who does everything right.</p><p>They authenticate. They send spec-compliant requests. They operate at volumes that look like legitimate integration traffic. They get what they came for &#8212; and they leave without triggering a single alert.</p><p>This is where API security currently lives, and it&#8217;s a governance nightmare masquerading as a technical problem.</p><h3><strong>The Number That Should End Every &#8220;We Have a WAF&#8221; Conversation</strong></h3><p>95% of API attacks in 2025 originated from authenticated sessions.</p><p>Let that land for a second. Not from unrecognised IPs. Not from known malicious signatures. From sessions your perimeter controls blessed as legitimate.</p><p><a href="http://bleepingcomputer.com/news/security/dell-api-abused-to-steal-49-million-customer-records-in-data-breach/">The Dell breach &#8212; 49 million customer records</a> &#8212; followed this exact pattern. An attacker registered as a fake partner, hit a service tag lookup endpoint with zero entitlement checking, and ran 5,000 requests per minute for three weeks. Authenticated. Spec-compliant. Undetected.</p><p>Meanwhile, AI-adjacent API vulnerabilities grew by nearly 400% year-on-year (439 CVEs in 2024; 2,185 in 2025), and 57% of organisations have suffered an API-related breach in the past two years, with average losses north of $4 million per incident.</p><p>These aren&#8217;t edge cases. This is the normal operating environment.</p><h3><strong>The Governance Gap Is Worse Than the Security Gap</strong></h3><p>Here&#8217;s what I find more troubling than the breach statistics: only 10&#8211;14% of organisations have anything resembling an API posture governance strategy. Only 19% are &#8220;very confident&#8221; in their own API inventory. And 80% lack continuous real-time monitoring &#8212; which means most organisations are not watching their API estate at all.</p><p>At the same time, API estates grew by 41% last year alone.</p><p>We are running faster and seeing less. That&#8217;s not a risk posture &#8212; that&#8217;s a prayer.</p><p>From my work with public sector clients, I can tell you this gap is even wider in government and central departments. Legacy systems, fragmented ownership, under-resourced teams, and simultaneous compliance obligations across half a dozen regulatory frameworks. The API is the connective tissue of the modern digital estate, and in many organisations no one owns it end-to-end.</p><h3><strong>What the Regulatory Pile-On Actually Means</strong></h3><p>If you work in financial services, healthcare, or critical national infrastructure, you are now operating under a convergence of API-relevant obligations that most legal and compliance teams haven&#8217;t fully mapped yet.</p><p><strong>DORA</strong>, mandatory since January 2025, imposes digital operational resilience testing with explicit third-party risk requirements. Your ICT provider&#8217;s API isn&#8217;t exempt just because it&#8217;s their infrastructure.</p><p><strong>NIS2</strong> expanded obligations to 18 sectors and roughly 300,000 entities, with incident reporting timelines of 24 hours and penalties up to &#8364;10 million or 2% of global turnover. Critically, it reaches into supply chain security &#8212; meaning the API integrations you manage indirectly are now in scope.</p><p><strong>PCI DSS 4.0</strong> Phase 2 controls, live since March 2025, contain the first explicit API mention in PCI history. They require automated, continuous detection and prevention of API-layer attacks. A WAF alone won&#8217;t get you there, and the QSA community is beginning to wake up to this.</p><p>The UK <a href="https://www.ncsc.gov.uk/blog-post/new-guidance-on-securing-http-based-apis">NCSC issued its first dedicated API security guidance in April 2025 </a>&#8212; seven foundational pillars from design through to lifecycle management. Worth reading if you haven&#8217;t already.</p><p>None of these frameworks are fully aligned. There&#8217;s no universal API security standard, and that creates compliance overhead and leaves genuine gaps that each framework assumes another one fills. That&#8217;s a legal and governance problem as much as a technical one.</p><h3><strong>The New Attack Class: When the Agent Doesn&#8217;t Know It&#8217;s Being Manipulated</strong></h3><p>Here&#8217;s where I want to spend some time, because this is the part that most enterprise security teams haven&#8217;t operationalised yet &#8212; and the vendors haven&#8217;t fully solved.</p><p>Agentic AI has fundamentally changed what an API call means.</p><p>In 2020, an API call returned a payload. In 2026, an API call can instruct an autonomous agent to send emails, query databases, trigger financial transactions, and call other agents &#8212; all without a human in the loop. Gartner reports 35% of enterprises now use agents for business-critical workflows, up from 8% in 2023. 80% of IT professionals have already seen agents perform unauthorised or unexpected actions.</p><p>This creates three new attack classes that no current governance framework adequately addresses.</p><p><strong>Indirect prompt injection</strong> is the most widely exploited. The attacker doesn&#8217;t attack the agent directly &#8212; they poison the content the agent retrieves. A malicious email sits in your inbox. A user asks your AI assistant a question. The assistant retrieves the email as context, activates the hidden instruction, and exfiltrates data via a rendering trick your Content Security Policy doesn&#8217;t catch. This is precisely what happened in the EchoLeak vulnerability (CVE-2025&#8211;32711) against Microsoft 365 Copilot. Zero clicks required. Zero visible trace. CVSS 9.3.</p><p><strong>Agent-to-agent privilege escalation</strong> is even harder to defend against, because the attack doesn&#8217;t target your perimeter &#8212; it targets trust. A low-privilege agent convinces a high-privilege agent to act on its behalf. One researcher demonstrated this in a multi-agent smart home environment: a malicious agent broadcast a natural language request, a trusted lock agent interpreted it as authorised, and the door unlocked. In enterprise ServiceNow environments, low-privilege agents have been shown to coerce higher-privilege agents into exporting case files to external URLs through second-order injection. Your IAM controls validated every credential. The attack happened at the semantic layer.</p><p><strong>Semantic privilege escalation</strong> may be the subtlest and most dangerous. The agent has exactly the permissions it should have. It performs an action those permissions technically allow. But the action violates the intent of the original task because a prompt injection in a document, ticket, or API response redirected its behaviour. Every policy check passes. The breach is invisible until the data shows up somewhere it shouldn&#8217;t.</p><p><a href="https://content.salt.security/owasp-api-top-10-2023-ebook.html?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=General%7CDesktop%7CUK%7CEN%7CSearch&amp;utm_content=20813027003-162923864104-682695863990&amp;utm_term=api+attacks&amp;LeadSource=advertising&amp;gad_source=1&amp;gad_campaignid=20813027003&amp;gbraid=0AAAAAC1PdVKK-j3-L5MbcKxxbNmvz3scK&amp;gclid=CjwKCAjwpcTNBhA5EiwAdO1S9ugavbZqnrV3Y0sjD5t9F4q3HmmrPVup9EKzBEPxqxKWn5Mckd5SNxoCvDcQAvD_BwE">OWASP released the </a><strong><a href="https://content.salt.security/owasp-api-top-10-2023-ebook.html?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=General%7CDesktop%7CUK%7CEN%7CSearch&amp;utm_content=20813027003-162923864104-682695863990&amp;utm_term=api+attacks&amp;LeadSource=advertising&amp;gad_source=1&amp;gad_campaignid=20813027003&amp;gbraid=0AAAAAC1PdVKK-j3-L5MbcKxxbNmvz3scK&amp;gclid=CjwKCAjwpcTNBhA5EiwAdO1S9ugavbZqnrV3Y0sjD5t9F4q3HmmrPVup9EKzBEPxqxKWn5Mckd5SNxoCvDcQAvD_BwE">Top 10 for Agentic Applications</a></strong> in December 2025. It&#8217;s the first systematic taxonomy of this attack class. If you&#8217;re deploying anything with agentic workflows and you haven&#8217;t read it, stop what you&#8217;re doing.</p><h3><strong>The Supply Chain Problem Isn&#8217;t Going Away</strong></h3><p>Approximately 30% of all data breaches now originate from third-party or supply chain compromise &#8212; doubled year-on-year. And annual vendor questionnaires are, frankly, inadequate.</p><p>The <a href="https://www.securityweek.com/700credit-data-breach-impacts-5-8-million-individuals/">700Credit breach</a> is instructive. Attackers compromised one of 200 integration partners, obtained valid API tokens, and ran high-volume queries for months. 5.8 million Social Security numbers were exfiltrated. The partner never notified 700Credit. The questionnaire had presumably been completed.</p><p>The U.S. Treasury breach &#8212; Chinese state actors (Silk Typhoon), zero-day in BeyondTrust&#8217;s infrastructure, single API key enabling remote access to OFAC and the Treasury Secretary&#8217;s office &#8212; followed the same pattern. A trusted third party was the entry point.</p><p>This is why zero-trust API architecture isn&#8217;t a nice-to-have. Every integration partner is a potential attack vector. Every API key issued is a standing risk if it isn&#8217;t ephemeral, scoped, and monitored. The principle of least privilege doesn&#8217;t stop at your own estate.</p><h3><strong>What Good Looks Like in 2026</strong></h3><p>I want to be concrete here, because the analysis is only useful if it points somewhere actionable.</p><p><strong>Continuous inventory, not periodic audits.</strong> You cannot govern what you cannot see. Shadow APIs, deprecated endpoints, and undocumented integrations are where attackers live. Runtime discovery &#8212; not scan-and-forget &#8212; is the baseline.</p><p><strong>Behavioural monitoring from the inside.</strong> Signature-based detection misses business logic abuse from authenticated sessions by design. You need anomaly detection that understands what legitimate API traffic looks like for your environment and alerts on deviations from that baseline.</p><p><strong>Ephemeral, scoped credentials for all agent interactions.</strong> Every agent-to-tool and agent-to-agent API call should use short-lived, narrowly scoped credentials. Persistent API keys in agentic workflows are a CISO incident waiting to happen.</p><p><strong>API governance as an IAM problem.</strong> This is my lens, and I think it&#8217;s the right one. Who (or what) can call which endpoints, under what conditions, with what audit trail? That&#8217;s an identity and access question. It belongs in your IAM strategy alongside your human user lifecycle. JML processes that cover human accounts but not service accounts and agent identities are leaving the back door open.</p><p><strong>Third-party API risk in your supply chain security programme.</strong> Not as a checkbox on a questionnaire &#8212; as a continuous monitoring obligation. What tokens does each integration partner hold? What&#8217;s the blast radius if they&#8217;re compromised?</p><h3><strong>The Market Signal</strong></h3><p>The API security market is growing at nearly 30% annually, and the vendor consolidation we&#8217;ve seen &#8212; Akamai absorbing Noname for $450 million, Traceable merging with Harness &#8212; tells you where enterprise budget is heading. Gartner&#8217;s 2025 Hype Cycle places API security testing at &#8220;High&#8221; benefit with under two years to plateau.</p><p>But the tooling for agentic AI API security is still genuinely early-stage. No vendor currently offers production-grade protection against semantic privilege escalation or cross-agent confused deputy attacks. The OWASP MCP Top 10 is under development. We are, as an industry, roughly where cloud IAM was in 2015: the threat is real, the frameworks are forming, and the organisations building governance frameworks now will be significantly ahead of those who wait for the standards to mature.</p><h3><strong>Closing Thoughts</strong></h3><p>There&#8217;s a line I keep returning to from <a href="https://openai.com/index/hardening-atlas-against-prompt-injection/">OpenAI&#8217;s December 2025 security assessmen</a>t: <em>&#8220;Prompt injection, much like scams and social engineering on the web, is unlikely to ever be fully &#8216;solved.&#8217;&#8221;</em></p><p>That&#8217;s not defeatism. It&#8217;s an invitation to think differently about the problem. We don&#8217;t &#8220;solve&#8221; phishing &#8212; we build layered defences, educate users, implement technical controls, and accept residual risk with clear governance around it.</p><p>API security in 2026 needs the same maturity shift. The attack surface is too large, too dynamic, and too deeply embedded in agentic systems for any single technical control to contain it. What it requires is governance &#8212; continuous, cross-functional, identity-aware governance &#8212; treating every API call as a trust decision that needs to be made consciously, logged reliably, and reviewed regularly.</p><p>The organisations that get there first won&#8217;t just be more secure. They&#8217;ll be better positioned for every regulatory audit, every third-party risk assessment, and every boardroom conversation about whether their AI deployments are actually under control.</p><p>Which, in 2026, is the question everyone is being asked &#8212; and very few can answer with confidence.</p>]]></content:encoded></item><item><title><![CDATA[State of Security | February 2026]]></title><description><![CDATA[MustardTree Partners Monthly Cybersecurity Report]]></description><link>https://blog.mustardtreegroup.com/p/state-of-security-february-2026</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/state-of-security-february-2026</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Wed, 25 Feb 2026 09:54:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yH32!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yH32!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yH32!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!yH32!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!yH32!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!yH32!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yH32!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2558731,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.mustardtreegroup.com/i/189115969?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yH32!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!yH32!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!yH32!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!yH32!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d1fbd59-ec01-49e2-8fb5-61ab688b413d_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>February 2026 has been defined by convergence. The threats we&#8217;ve been tracking individually &#8212; AI-powered offensive operations, nation-state supply chain infiltration, ransomware fragmentation, and regulatory acceleration &#8212; are no longer operating in parallel. They&#8217;re colliding. The Milan-Cortina Winter Olympics provided a live demonstration of what happens when geopolitical tension meets digital infrastructure at scale. Meanwhile, an unprecedented wave of zero-day exploitation forced emergency responses across every major platform simultaneously, and the cybersecurity industry&#8217;s own structural transformation accelerated with the largest acquisition in its history. This month&#8217;s report examines the forces reshaping the threat landscape and what they demand of defenders.</p><h2>The Olympics Under Siege: When Cyber Meets Geopolitics</h2><p>The Milan-Cortina 2026 Winter Olympics became the most heavily targeted Games in history &#8212; and the most extensively defended. Italy&#8217;s National Cybersecurity Agency stood up a 24/7 command centre in Rome, deploying 6,000 security officers across venues spanning 22,000 square kilometres of northern Italy. They needed every one of them.</p><p>Pro-Russian hacktivist group NoName057(16) launched sustained DDoS campaigns against Olympic infrastructure, Italian government websites, and the diplomatic network &#8212; including the Italian embassy in Washington and consulates across four continents. The group framed the attacks as retaliation for Italy&#8217;s support of Ukraine, but the operational pattern reveals something more calculated. DDoS was the visible layer; the concern among security teams was that volumetric attacks served as cover for deeper intrusion attempts against operational technology: power grids in the Dolomites, snow-making systems, scoring networks, and ticketing platforms.</p><p>The threat landscape extended well beyond Russia. Palo Alto Networks&#8217; Unit 42 identified APT28, China&#8217;s Mustang Panda, and North Korea&#8217;s Kimsuky as credible threats. The BD Anonymous group announced an #OpItaly campaign, while Z-Pentest Alliance and Server Killers claimed attacks against Italian industrial control systems. Russia&#8217;s exclusion from the Games &#8212; driven not by doping disputes but by the geopolitical fallout of the Ukraine invasion &#8212; removed a critical restraining influence. When marquee winter sports like ice hockey and figure skating are absent from the Russian national conversation, the calculus around offensive operations shifts.</p><p>The Milan-Cortina experience confirms what security strategists have long warned: major international events are no longer just physical security challenges. They are cyber battlegrounds where nation-state proxies, hacktivists, and opportunistic criminals converge simultaneously.</p><h2>Zero-Day Avalanche: February&#8217;s Emergency Patching Crisis</h2><p>February 2026 will be remembered as an emergency-level patching month. Microsoft&#8217;s Patch Tuesday addressed 58 vulnerabilities, including a staggering six actively exploited zero-days &#8212; an event that prompted CISA to add all six to its Known Exploited Vulnerabilities catalogue with a March 3rd remediation deadline for federal agencies.</p><p>The severity profile is alarming. CVE-2026-21510, a Windows Shell bypass rated CVSS 8.8, allows a single click on a malicious link to silently execute attacker-controlled content without any warning dialog. CVE-2026-21513 achieves similar results through the MSHTML Framework. CVE-2026-21533, discovered by CrowdStrike, revealed that threat actors had been exploiting a privilege escalation flaw to target organisations in the United States and Canada since at least December 2025 &#8212; meaning defenders were unknowingly exposed for months before the patch arrived.</p><p>But Microsoft wasn&#8217;t alone. Google patched CVE-2026-2441, the first actively exploited Chrome zero-day of the year &#8212; a use-after-free vulnerability in CSS that enables arbitrary code execution through a malicious website. Apple shipped emergency updates across its entire ecosystem for CVE-2026-20700, a flaw weaponised in what the company described as an &#8220;extremely sophisticated attack&#8221; targeting specific individuals. BeyondTrust disclosed CVE-2026-1731 with a CVSS score of 9.9, actively exploited in the wild. Dell&#8217;s RecoverPoint for Virtual Machines was found to contain hard-coded credentials enabling unauthenticated remote root access.</p><p>The simultaneous exploitation across Microsoft, Google, Apple, Dell, and BeyondTrust products represents a fundamental challenge: organisations cannot triage when everything is critical simultaneously. The traditional &#8220;patch by severity&#8221; approach collapses when every major vendor releases emergency fixes in the same window.</p><h2>The Shadow Campaign and the Supply Chain Siege</h2><p>Nation-state operations reached a new threshold of ambition in February. Palo Alto Networks disclosed what it calls the &#8220;Shadow Campaign&#8221; &#8212; a state-sponsored espionage operation that compromised at least 70 organisations across 37 countries. Tracked as TGR-STA-1030 and assessed with high confidence to be a Chinese nexus group, the campaign targeted government agencies and critical infrastructure with systematic precision.</p><p>The Notepad++ supply chain compromise may prove even more consequential. Between June and December 2025, the Lotus Blossom group &#8212; a known state-sponsored threat actor &#8212; infiltrated the official hosting infrastructure for Notepad++, one of the world&#8217;s most widely used text editors. They intercepted and redirected traffic destined for the update server, selectively targeting users in Southeast Asian government, telecommunications, and critical infrastructure sectors. The implications are stark: if a ubiquitous open-source tool&#8217;s update mechanism can be silently weaponised for six months, the entire software supply chain model requires re-examination.</p><p>Meanwhile, the FBI confirmed at CyberTalks that Salt Typhoon remains an active, ongoing threat. The Chinese espionage group&#8217;s infiltration of US telecommunications infrastructure &#8212; now confirmed at nine major carriers &#8212; continues to provide counterintelligence capabilities that effectively wiretap the wiretappers. Volt Typhoon&#8217;s pre-positioning in critical infrastructure for potential kinetic conflict scenarios persists, with renewed attempts to re-establish access to networks from which it was previously evicted. Ivanti vulnerabilities were exploited in targeted attacks against the European Commission and Dutch and Finnish government agencies.</p><p>The common thread across these operations is patience. These are not smash-and-grab campaigns. They are systematic, long-duration infiltrations designed to persist undetected while providing strategic advantage.AI Crosses the Rubicon: From Tool to Autonomous Attacker</p><p>The transition from AI-assisted to AI-driven offensive operations accelerated dramatically. A Russian-speaking threat actor leveraged commercial generative AI services to compromise over 600 FortiGate devices across 55 countries between January and February. The significance isn&#8217;t the scale alone &#8212; it&#8217;s that the attacker was assessed as unsophisticated. AI transformed weak credentials and exposed management ports into a global campaign that would previously have required nation-state resources.</p><p>The agentic AI threat moved from theoretical to operational. Anthropic reported an observed intrusion where AI executed 80&#8211;90% of the activity autonomously, with human operators intervening only at a handful of decision points. This represents a fundamental inflection: the adversary&#8217;s constraint is no longer technical skill but access to AI tooling.</p><p>On the defensive side, the enterprise rush to deploy AI agents created its own attack surface. A Dark Reading poll found 48% of cybersecurity professionals now identify agentic AI as the top attack vector heading into 2026. The WEF&#8217;s Global Cybersecurity Outlook reports 94% of respondents believe AI will be the single biggest driver of change in cybersecurity this year. The risks are specific and documented: prompt injection attacks achieving 92% success rates across open-weight models, agent-to-agent impersonation enabling unauthorised capability escalation, memory poisoning of long-term agent storage, and supply chain attacks through the rapidly adopted Model Context Protocol ecosystem.</p><p>NIST responded by launching its AI Agent Standards Initiative, acknowledging that more than 80% of Fortune 500 companies now deploy active AI agents. The gap between deployment speed and security maturity is widening &#8212; and adversaries are already exploiting it.</p><h2>The Ransomware Metamorphosis</h2><p>The ransomware ecosystem continued its structural transformation. Attack volume surged &#8212; publicly reported incidents rose 47% year-over-year to approximately 7,200 in 2025, with February showing no signs of deceleration. The FCC cited a fourfold increase in ransomware attacks since 2021 in urging telecommunications firms to strengthen defences.</p><p>But the economics are shifting beneath the surface. Ransom payments declined in both total volume and average size, as more organisations refuse to pay, invest in backup resilience, and engage law enforcement. Sixty-four percent of victims now refuse payment on principle. The response from threat actors has been predictable: the pivot to pure data extortion accelerated. Encryption is increasingly bypassed entirely in favour of exfiltrating sensitive data and threatening public release. This reduces technical overhead while maintaining leverage through regulatory exposure and reputational damage.</p><p>The ecosystem&#8217;s fragmentation intensified. Where 2025 still featured recognisable ransomware brands, February 2026 saw rapid rebranding, affiliate migration, and the emergence of new groups including CipherForce and NightSpire alongside established operators like Qilin and ShinyHunters. Attribution has become significantly harder. Recorded Future assessed that 2026 will be the first year the number of new ransomware operators outside Russia exceeds those emerging within it &#8212; reflecting global expansion rather than Russian decline.</p><p>The insider threat dimension grew more concerning. Ransomware operators are increasingly recruiting corporate insiders &#8212; specifically targeting native English speakers &#8212; to provide initial access. With credential-based intrusions already dominating the initial access landscape, the combination of purchased credentials, vulnerability exploitation, and recruited insiders creates a multi-vector entry problem that perimeter defences alone cannot address.</p><h2>Google-Wiz: The $32 Billion Bet Reshapes the Industry</h2><p>On February 10th, the European Commission granted unconditional approval for Google&#8217;s $32 billion acquisition of Wiz &#8212; the largest cybersecurity acquisition in history. With prior DOJ clearance, the deal is now positioned to close, fundamentally reshaping the competitive landscape.</p><p>The strategic logic is clear: the integration of Wiz&#8217;s cloud security scanning capabilities with Google&#8217;s Gemini AI models and Mandiant&#8217;s threat intelligence creates an end-to-end autonomous security platform. Google&#8217;s vision of AI-native security operations &#8212; where scanning, detection, and response happen at machine speed &#8212; moves from concept to operational capability.</p><p>The competitive implications are significant. While Google committed to maintaining Wiz&#8217;s cross-platform support for AWS, Azure, and Oracle Cloud, the potential for preferential integration with Google Cloud is the elephant in the room. For organisations building multi-cloud security architectures, the consolidation raises questions about vendor neutrality and long-term platform strategy. For the broader market, it signals that cybersecurity&#8217;s next phase will be defined by whoever best integrates AI, cloud infrastructure, and threat intelligence into a unified platform.</p><h2>Regulatory Momentum Builds Across Jurisdictions</h2><p>The regulatory landscape tightened on multiple fronts. The EU&#8217;s NIS2 Directive moved decisively from national transposition to active enforcement, significantly expanding the number of organisations in scope. The Cyber Resilience Act&#8217;s mandatory security requirements for connected products approach their 2026 compliance deadline. The European Cybersecurity Act&#8217;s proposed revision reflects a 150% increase in cyber-attacks since its original adoption, with expanded scope and strengthened requirements.</p><p>In the United States, the regulatory picture remained complex. The CISA incident reporting rule was delayed until May 2026 amid industry criticism that the proposed requirements are overly broad. CISA itself enters 2026 without a Senate-confirmed director, creating leadership uncertainty at a critical moment. At the state level, the patchwork expanded to 20 states enforcing consumer privacy statutes, with California continuing to refine requirements around automated decision-making and cybersecurity audits. New York&#8217;s Department of Financial Services began its first full examination cycle under amended cybersecurity regulations, with enforcement focus on governance, risk assessment, and multi-factor authentication.</p><p>The US House passed the PILLAR Act to renew cybersecurity grants for state and local governments &#8212; an acknowledgement that municipal and state-level organisations face nation-state calibre threats with significantly fewer resources. Smaller financial institutions face a June 3rd compliance deadline under amended Regulation S-P requirements, including new mandates for incident response programmes, customer notification, and service provider due diligence.</p><p>The overarching trend is regulatory convergence toward accountability: organisations must demonstrate not just compliance but active, measurable security posture improvements.</p><h2>Strategic Imperatives</h2><p>February&#8217;s events demand specific defensive responses:</p><p><strong>Adopt crisis-speed patching protocols.</strong> The simultaneous exploitation across multiple vendors requires pre-approved emergency patching workflows that bypass standard change management timescales. Waiting for the next maintenance window is no longer viable when six zero-days are actively exploited.</p><p><strong>Harden the software supply chain.</strong> The Notepad++ and AI model supply chain compromises demonstrate that trusted software distribution channels are now primary attack vectors. Implement integrity verification for all software updates, restrict auto-update mechanisms in sensitive environments, and maintain software bills of materials.</p><p><strong>Secure AI agent deployments.</strong> The rush to deploy agentic AI is outpacing security controls. Every AI agent requires identity governance, privilege boundaries, output validation, and monitoring equivalent to a human employee with the same access. Memory persistence, tool access, and inter-agent communication are all attack surfaces that demand immediate attention.</p><p><strong>Prepare for data-only extortion.</strong> Traditional ransomware defences focused on backup and recovery are insufficient when attackers skip encryption entirely. Data loss prevention, network segmentation, and exfiltration detection must be prioritised alongside &#8212; not behind &#8212; backup resilience.</p><p><strong>Consolidate event-driven threat intelligence.</strong> Major international events are now predictable triggers for coordinated cyber campaigns. Organisations with any connection to host nations, participating organisations, or supporting infrastructure must integrate event calendars into their threat modelling.</p><h2>Looking Ahead</h2><p>March will bring the conclusion of the Milan-Cortina Games and a likely surge in post-event disclosure of attacks that were contained but not yet public. The CISA incident reporting rule&#8217;s progress toward its May deadline will shape US reporting obligations for years to come. The Google-Wiz integration will begin revealing whether the promise of AI-native security operations can be delivered at scale. And the ransomware ecosystem&#8217;s fragmentation will continue testing attribution capabilities and law enforcement coordination.</p><p>The thread connecting February&#8217;s events is acceleration. Threats are moving faster, exploits are being weaponised sooner, AI is lowering barriers more rapidly, and the regulatory response &#8212; while heading in the right direction &#8212; is struggling to keep pace. The organisations that thrive will be those that match this acceleration with their own: in detection, in patching, in adaptation, and in strategic foresight.</p><div><hr></div><p><em>This report is produced by MustardTree Partners as part of our ongoing commitment to providing actionable cybersecurity intelligence for senior leadership and technology decision-makers</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Be87!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Be87!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!Be87!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!Be87!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!Be87!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Be87!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2558731,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.mustardtreegroup.com/i/189115969?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Be87!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!Be87!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!Be87!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!Be87!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73a8e616-95e5-4218-935a-0cb45e00f2d4_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>.</em></p>]]></content:encoded></item><item><title><![CDATA[The SaaSpocalypse Is Here: AI Disruption Crosses the Rubicon ]]></title><description><![CDATA[Technology Briefing | Week of 10 February 2026]]></description><link>https://blog.mustardtreegroup.com/p/the-saaspocalypse-is-here-ai-disruption</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/the-saaspocalypse-is-here-ai-disruption</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Fri, 13 Feb 2026 08:39:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_N_m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div><hr></div><p><em>What began as a product update from a single AI company has erased over $1 trillion in market value, sent shockwaves from Wall Street to Mumbai, and forced investors to confront an uncomfortable truth: the AI disruption thesis is no longer theoretical. It&#8217;s repricing entire industries in real time.</em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_N_m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_N_m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png 424w, https://substackcdn.com/image/fetch/$s_!_N_m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png 848w, https://substackcdn.com/image/fetch/$s_!_N_m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png 1272w, https://substackcdn.com/image/fetch/$s_!_N_m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_N_m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png" width="709" height="434" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:434,&quot;width&quot;:709,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:563263,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.mustardtreegroup.com/i/187833717?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_N_m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png 424w, https://substackcdn.com/image/fetch/$s_!_N_m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png 848w, https://substackcdn.com/image/fetch/$s_!_N_m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png 1272w, https://substackcdn.com/image/fetch/$s_!_N_m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89a7363a-a37d-4e2c-a95b-962bf118f810_709x434.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The second week of February 2026 will be studied in business schools for years. A cascading series of AI-driven market shocks has fundamentally shifted investor psychology from &#8220;AI excitement&#8221; to what analysts are now calling &#8220;AI Darwinism&#8221; &#8212; a brutal, sector-by-sector repricing of companies deemed vulnerable to autonomous AI systems.</p><p>The trigger was deceptively modest. On 30 January, Anthropic released a set of industry-specific plugins for Claude Cowork, its AI-powered workplace assistant capable of authoring documents, organising files, and executing multi-step professional workflows. Plugins tailored for legal, finance, sales, and data marketing went live on Friday 31 January. By Tuesday, the market response was savage.</p><p>Thomson Reuters plunged 15.83% &#8212; its biggest single-day drop on record. LegalZoom sank 19.68%. The London Stock Exchange Group fell approximately 13%, while RELX, parent of LexisNexis, dropped 14%. FactSet Research Systems fell 10%, with S&amp;P Global, Moody&#8217;s, and Nasdaq all seeing sharp declines. ServiceNow tumbled nearly 7%, pushing its year-to-date losses to 28%, while Salesforce dropped about 7%, bringing its 2026 decline to almost 26%.</p><p>Then came Thursday 6 February. Anthropic unveiled Claude Opus 4.6, an advanced model designed to coordinate teams of AI agents and perform sophisticated professional tasks &#8212; including financial analysis, due diligence, and market intelligence synthesis. The selloff deepened. Bloomberg calculated that roughly $1 trillion of market value evaporated within a week.</p><p>Jefferies traders coined the term that has since defined the moment. &#8220;We call it the &#8216;SaaSpocalypse,&#8217; an apocalypse for software-as-a-service stocks,&#8221; said Jeffrey Favuzza from the firm&#8217;s equity trading desk. JPMorgan analyst Toby Ogg captured the depth of investor sentiment even more starkly, noting that the sector &#8220;isn&#8217;t just guilty until proven innocent but is now being sentenced before trial.&#8221;</p><h2>Beyond Software: The Contagion Spreads</h2><p>What makes this week&#8217;s events genuinely significant for technology analysts &#8212; and for anyone making investment decisions &#8212; is that the disruption narrative has broken containment. This is no longer a software sector story. AI-driven repricing is now hitting financial services, professional services, business process outsourcing, and global IT services with equal ferocity.</p><p>On 10 February, a new AI-powered tax planning tool from fintech platform Altruist triggered a separate wave of selling across wealth management stocks. LPL Financial closed 8.31% lower after tumbling 11% in midday trading, while Charles Schwab fell 7.42% and Raymond James Financial lost 8.75%. The tool demonstrated the ability to create fully personalised tax strategies for clients within minutes &#8212; work that currently sustains significant revenue streams for advisory firms.</p><p>The shockwaves reached Asia within days. India&#8217;s Nifty IT index shed over 4% to reach a four-month low on 12 February, wiping approximately &#8377;1.3 lakh crore from the combined market capitalisation of leading IT firms. TCS, Wipro, Cyient, and Hexaware Technologies all hit 52-week lows. Infosys fell 6%, and the Nifty IT index has now declined approximately 14% over the past seven trading days.</p><p><em>The Indian IT selloff is particularly telling because it exposes a structural vulnerability that extends across the entire global services economy. AI&#8217;s potential to automate tasks previously performed by human capital threatens the bedrock of the IT services business model. Analysts estimate the impact could translate to a 5&#8211;10% reduction in core coding demand and a 10&#8211;15% impact on operations including finance, procurement, and HR outsourcing.</em></p><p>For investors and business leaders, the message is clear: if your company&#8217;s value proposition relies on per-seat licensing, billable hours, or labour-intensive knowledge work, the market is now actively discounting your future.</p><h2>Anthropic&#8217;s $30 Billion War Chest</h2><p>Against this backdrop of market carnage, the company at the centre of the storm completed one of the largest private funding rounds in technology history.</p><p>Anthropic closed a $30 billion Series G funding round at a $380 billion post-money valuation &#8212; more than double what it was worth in September when it last raised money. The round was led by Singapore sovereign wealth fund GIC and Coatue Management, with co-leads including D.E. Shaw Ventures, Dragoneer, Peter Thiel&#8217;s Founders Fund, ICONIQ, and Abu Dhabi&#8217;s MGX. The round also includes portions of previously announced investments from Microsoft and Nvidia.</p><p>The numbers tell a story of exponential enterprise adoption. Anthropic&#8217;s annualised revenue has reached $14 billion, growing more than 10x annually over the past three years. Claude Code, its AI coding agent, now has run-rate revenue exceeding $2.5 billion &#8212; more than double its level at the start of the year. Enterprise customers spending over $100,000 annually have grown 7x in the past twelve months.</p><p>This is the second-largest private tech fundraising round on record, trailing only OpenAI&#8217;s $40 billion+ raise. And the arms race continues: OpenAI is reportedly assembling a new round that could close at around $100 billion.</p><p>The sheer scale of capital flowing into frontier AI labs &#8212; while the companies those labs are disrupting haemorrhage market value &#8212; crystallises the dual nature of this moment. We are witnessing both the greatest concentration of private capital formation and the fastest destruction of incumbent business models in recent market history, driven by the same underlying technology.</p><h2>What This Means for Investment Strategy</h2><p>Several structural shifts are now undeniable.</p><p><strong>The &#8220;winners vs losers&#8221; framework is permanent.</strong> </p><p>The era of every tech stock benefiting from AI enthusiasm is over. Deutsche Bank&#8217;s Jim Reid noted that the market has shifted from an &#8220;every tech stock is a winner&#8221; mindset to a &#8220;true winners and losers landscape.&#8221; Capital is flowing aggressively toward AI infrastructure providers and frontier labs, and flowing out of companies whose business models AI can replicate or automate.</p><p><strong>Per-seat and per-user pricing models are under existential threat.</strong> </p><p>The core concern is that AI tools will reduce the need for multiple software licences, weakening revenue growth across the entire SaaS sector. Companies that cannot transition to value-based or compute-based pricing will face sustained valuation compression.</p><p><strong>The disruption radius is expanding faster than expected.</strong> </p><p>Six months ago, the AI disruption conversation centred on coding assistants and chatbots. Today it encompasses legal services, financial advisory, tax planning, data analytics, IT outsourcing, and enterprise software broadly. Private equity firms are reportedly hiring consultants to audit their portfolios for AI-vulnerable holdings.</p><p><strong>Physical-world assets are emerging as a hedge.</strong> </p><p>Apollo&#8217;s chief economist Torsten Slok has urged investors to look past the tech volatility, arguing that the broader economy is positioned for a boom driven by reindustrialisation, infrastructure spending, and locked-in data centre capital expenditure. Google, Amazon, and Meta have announced a combined $660 billion in capital expenditure plans for 2026. AI capex is forecast to quadruple to $1.2 trillion by 2030.</p><p><strong>Don&#8217;t confuse market panic with immediate obsolescence.</strong> </p><p>Gartner analysts have cautioned that predictions of the death of SaaS and enterprise applications are premature, arguing that tools like Claude Cowork are task-level automators rather than replacements for mission-critical business systems. The comparison to the displacement of BlackBerry is apt &#8212; the technology survived, but the stock lost 98% of its value. The question for every incumbent is not whether AI will make them obsolete overnight, but whether they can integrate fast enough to avoid terminal decline.</p><h2>Our View</h2><p>We are at an inflection point that mirrors the early internet era in its capacity to reshape entire industries &#8212; but is moving at a pace that makes the dotcom transition look leisurely by comparison. The <em>SaaSpocalypse </em>is not a one-week event. It is the opening chapter of a multi-year repricing that will reward companies with proprietary data, AI-native architecture, and physical-world moats, while punishing those whose value propositions can be replicated by an autonomous agent.</p><p>For enterprises, the strategic imperative is immediate: assess where your workflows are vulnerable to agentic AI, invest in the integrations that make AI a competitive advantage rather than a displacement threat, and recognise that the regulatory landscape &#8212; from the EU AI Act in August 2026 to the Colorado AI Act in June 2026 &#8212; will shape how quickly adoption accelerates.</p><p>For investors, the week was the market&#8217;s way of saying: <em><strong>the AI disruption thesis is no longer priced in as a future possibility. It is being priced in as a present reality</strong></em>.</p>]]></content:encoded></item><item><title><![CDATA[Quantum Computing: You Can’t Protect What You Can’t Find]]></title><description><![CDATA[A Practical Guide to Cryptographic Discovery]]></description><link>https://blog.mustardtreegroup.com/p/quantum-computing-you-cant-protect</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/quantum-computing-you-cant-protect</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Mon, 02 Feb 2026 12:04:14 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>The first step in quantum readiness is knowing where your cryptography actually lives</em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="7728" height="4805" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4805,&quot;width&quot;:7728,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A man sitting on a train using a laptop computer&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A man sitting on a train using a laptop computer" title="A man sitting on a train using a laptop computer" srcset="https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1719360465994-60d77b78c4c0?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8Y3liZXJzZWN8ZW58MHx8fHwxNzY5NzcxNDMwfDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@furkanelveren">Furkan Elveren</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>In my previous piece on Harvest Now, Decrypt Later, I argued that senior leadership need to own the quantum cryptography conversation. Mosca&#8217;s Theorem gives us a clear framework: if the time your data needs protection plus your migration timeline exceeds the arrival of Q-Day, you&#8217;re already exposed.</p><p>The response I received was telling. Most readers agreed with the urgency. But the question that came back repeatedly was disarmingly simple: <em>&#8220;Where do we actually start?&#8221;</em></p><p>The answer is equally simple, and brutally difficult: you start by finding out where cryptography lives in your organisation. All of it.</p><p>This is the cryptographic inventory&#8212;the foundation upon which every quantum readiness initiative must be built. Without it, you&#8217;re not doing post-quantum migration. You&#8217;re doing post-quantum guesswork.</p><h2>Why This Is Harder Than It Sounds</h2><p>Most organisations dramatically underestimate the scope of cryptographic discovery. When I ask security teams where their cryptography is, I typically get confident answers: TLS certificates, VPN configurations, maybe some database encryption. These are the visible tips of an enormous iceberg.</p><p>The reality is that cryptography has become so embedded in modern enterprise architecture that it&#8217;s effectively invisible. It&#8217;s in places your security team doesn&#8217;t manage, in systems your IT department didn&#8217;t build, and in dependencies your developers never consciously chose.</p><p>Consider a typical enterprise application. The code itself might use explicit encryption libraries. But it also inherits cryptography from the framework it&#8217;s built on, the runtime environment it executes in, the container it&#8217;s packaged in, the orchestration platform that deploys it, the service mesh that routes its traffic, the API gateway that exposes it, and the cloud platform that hosts it. Each layer brings its own cryptographic implementations, configurations, and vulnerabilities.</p><p>Multiply this by hundreds or thousands of applications, add in legacy systems, third-party integrations, IoT devices, and shadow IT, and you begin to appreciate the scale of the problem.</p><h2>The Five Domains of Cryptographic Discovery</h2><p>Through numerous discovery exercises, I&#8217;ve found it useful to think about cryptographic inventory across five distinct domains. Each requires different tools, different expertise, and different stakeholders.</p><p><strong>Domain 1: Network and Transport Layer</strong></p><p>This is where most organisations start, and for good reason&#8212;it&#8217;s the most visible. TLS/SSL certificates protecting web applications, API endpoints, and internal services. IPsec configurations for VPNs and site-to-site connections. SSH keys for administrative access. Load balancer and reverse proxy configurations.</p><p>The tools here are relatively mature. Certificate discovery scanners can enumerate your external attack surface. Internal network scanning can identify services using deprecated protocols or weak cipher suites. Most organisations have some visibility here, even if it&#8217;s incomplete.</p><p>But &#8220;some visibility&#8221; isn&#8217;t enough for quantum readiness. You need comprehensive coverage, including certificates issued by internal CAs, self-signed certificates in development environments, and machine identities that nobody remembers creating. The certificate you forgot about is the one that will still be using RSA-2048 when Q-Day arrives.</p><p><strong>Domain 2: Application Layer</strong></p><p>This is where discovery becomes significantly more complex. Applications use cryptography in ways that don&#8217;t traverse the network&#8212;encrypting data at rest, hashing passwords, generating signatures, protecting secrets in memory.</p><p>Discovery here requires a combination of approaches. Static code analysis can identify cryptographic library usage and flag deprecated algorithms. Software composition analysis reveals cryptographic dependencies in third-party components. Runtime analysis can detect cryptographic operations that static analysis misses&#8212;dynamically loaded libraries, reflection-based invocations, and configuration-driven algorithm selection.</p><p>The challenge is coverage. Most organisations have hundreds of applications, many without source code access (vendor packages, legacy systems, acquired companies). You&#8217;ll need to accept that application-layer discovery will be iterative and incomplete, prioritising based on data sensitivity.</p><p><strong>Domain 3: Data Layer</strong></p><p>Databases, file systems, backup systems, archives&#8212;anywhere data persists, cryptography may be protecting it. Transparent Data Encryption in your SQL Server instances. Encrypted columns in application databases. Encrypted backups sitting in cold storage. File-level encryption on endpoints.</p><p>This domain intersects directly with your data classification efforts. Remember Mosca&#8217;s X variable&#8212;how long does this data need to remain confidential? Your most sensitive, longest-lived data should be prioritised for quantum-safe migration. But first, you need to know how it&#8217;s currently protected.</p><p>Don&#8217;t forget data in transit between systems. ETL pipelines, replication streams, backup transfers&#8212;all may use cryptographic protection that needs to be catalogued.</p><p><strong>Domain 4: Identity and Access Management</strong></p><p>This is my home territory, and I can tell you it&#8217;s a minefield for cryptographic discovery. Identity systems are among the most cryptographically complex components in any enterprise, and among the hardest to migrate.</p><p>Consider what&#8217;s involved: certificate-based authentication for users and devices, Kerberos encryption in Active Directory environments, SAML and OAuth token signing, smart card and hardware token integrations, federation trust relationships with partners and cloud providers. Each of these involves cryptographic keys, algorithms, and protocols that need to be inventoried.</p><p>The interdependencies make this particularly challenging. Your identity provider&#8217;s signing keys are trusted by dozens of service providers. Your Active Directory&#8217;s Kerberos implementation touches every domain-joined system. Changing cryptography in identity systems isn&#8217;t just a technical migration&#8212;it&#8217;s an exercise in coordinating trust relationships across your entire ecosystem.</p><p><strong>Domain 5: Hardware and Embedded Systems</strong></p><p>The most overlooked domain, and often the hardest to address. Hardware Security Modules storing your most sensitive keys. Trusted Platform Modules in endpoints. Cryptographic implementations in network appliances, IoT devices, industrial control systems, building management systems.</p><p>Many of these systems have cryptography baked into firmware that can&#8217;t be easily updated. Some have cryptographic implementations that predate current best practices. And some are connected to operational technology environments where the very concept of &#8220;patching&#8221; is fraught with safety implications.</p><p>This domain requires close collaboration with operational technology teams, facilities management, and procurement. You need to understand not just what cryptography is in use today, but what the upgrade path looks like&#8212;and whether one exists at all.</p><h2>Building Your Discovery Programme</h2><p>Cryptographic inventory isn&#8217;t a project with a completion date. It&#8217;s an ongoing programme that needs to be embedded in your security operations. Here&#8217;s how to structure it:</p><p><strong>Start with what you know.</strong> Don&#8217;t let the perfect be the enemy of the good. Begin with your certificate management system, your PKI infrastructure, your known encryption implementations. Build initial inventory from existing documentation, even if incomplete.</p><p><strong>Layer in automated discovery.</strong> Deploy network scanning for certificate enumeration. Integrate software composition analysis into your CI/CD pipelines. Use cloud security posture management tools that identify cryptographic configurations in your cloud environments.</p><p><strong>Engage application teams.</strong> Automated tools will only get you so far. Application owners know their systems better than any scanner. Create a structured questionnaire and work through your application portfolio systematically. Yes, this takes time. There&#8217;s no shortcut.</p><p><strong>Don&#8217;t forget third parties.</strong> Your supply chain uses cryptography to protect data you&#8217;ve entrusted to them. SaaS providers, cloud platforms, managed service providers&#8212;all should be able to articulate their cryptographic posture and their quantum readiness roadmap. Add this to your vendor risk assessments.</p><p><strong>Maintain continuously.</strong> New applications deploy. Configurations change. Certificates rotate (or don&#8217;t, which is its own problem). Your cryptographic inventory needs to be treated as a living document, updated through integration with change management processes and continuous discovery scanning.</p><h2>Structuring the Output</h2><p>A cryptographic inventory that lives in a spreadsheet and never gets used is worse than useless&#8212;it provides false confidence. The output of your discovery programme needs to be structured for action.</p><p>At minimum, each cryptographic asset should be catalogued with: the system or application it belongs to, the algorithm and key length in use, the data or function it protects, the sensitivity classification of that data, the Mosca X value (how long the data needs protection), the asset owner, and the feasibility of migration.</p><p>This allows you to prioritise. High-sensitivity data with long protection requirements, protected by vulnerable algorithms, in systems that can be migrated&#8212;these are your first targets. Low-sensitivity data in systems that will be decommissioned before Q-Day can wait.</p><h2>The Uncomfortable Discoveries</h2><p>I&#8217;ll warn you now: cryptographic discovery surfaces uncomfortable truths. You&#8217;ll find systems using MD5 for integrity checks. You&#8217;ll find certificates that expired years ago but somehow still work. You&#8217;ll find SSH keys that were generated in 2009 and have never been rotated. You&#8217;ll find encryption implementations where nobody knows who holds the keys.</p><p>This is normal. Every organisation I&#8217;ve worked with has cryptographic skeletons in the closet. The purpose of discovery isn&#8217;t to achieve some platonic ideal of cryptographic hygiene&#8212;it&#8217;s to understand your actual posture so you can make informed decisions about risk and prioritisation.</p><p>Don&#8217;t let the scale of the problem paralyse you. Document what you find, prioritise ruthlessly based on data sensitivity and exposure, and start the migration where it matters most.</p><h2>What Comes Next</h2><p>Cryptographic inventory is the foundation, not the destination. With a clear picture of where cryptography lives in your organisation, you can begin the harder work: developing crypto-agility so you can swap algorithms without rebuilding systems, testing NIST&#8217;s post-quantum standards in your environment, and building the business case for the multi-year migration programme that lies ahead.</p><p>In my next piece, I&#8217;ll explore what crypto-agility actually looks like in practice&#8212;particularly in identity systems, where the interdependencies make migration uniquely challenging.</p><p>For now, start finding your cryptography. All of it. The inventory you build today is the roadmap you&#8217;ll follow when Q-Day arrives.</p>]]></content:encoded></item><item><title><![CDATA[State of Security | January 2026]]></title><description><![CDATA[MustardTree Partners Monthly Cybersecurity Report]]></description><link>https://blog.mustardtreegroup.com/p/state-of-security-january-2026</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/state-of-security-january-2026</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Fri, 30 Jan 2026 13:01:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JvKk!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d330ce-e3f8-4a23-b8c7-8e86d3602f01_398x398.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!N8kM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N8kM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg 424w, https://substackcdn.com/image/fetch/$s_!N8kM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg 848w, https://substackcdn.com/image/fetch/$s_!N8kM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!N8kM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N8kM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg" width="868" height="287" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:287,&quot;width&quot;:868,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:193218,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.lgger.com/i/186189587?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N8kM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg 424w, https://substackcdn.com/image/fetch/$s_!N8kM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg 848w, https://substackcdn.com/image/fetch/$s_!N8kM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!N8kM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddea2b5f-370a-4e3c-ab93-1b9fe57a3ed4_868x287.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The cybersecurity landscape entering 2026 is nothing short of transformational. We&#8217;ve moved beyond the era of human-speed cyber operations into something fundamentally different: machine-speed warfare driven by autonomous AI agents, executed against a backdrop of intensifying geopolitical fractures. This month&#8217;s report examines the convergence of these forces and what they mean for organisations navigating the year ahead.</p><h2>The Poly-Crisis Reality</h2><p>January 2026 marks a watershed moment. Organisations globally now face an average of nearly 2,000 cyber attacks per week&#8212;a staggering 70% increase since 2023. But this isn&#8217;t merely about volume. The mechanics of cyber warfare have fundamentally shifted. The window between initial compromise and lateral movement has shrunk to under 60 minutes in advanced campaigns. When your adversary operates at machine speed, your defences must match that pace.</p><p>The World Economic Forum&#8217;s latest cybersecurity outlook confirms what many practitioners have suspected: we&#8217;re operating in a &#8220;poly-crisis&#8221; where hyper-accelerated AI threats, geopolitical fragmentation, and structural shifts in cybercrime economics converge simultaneously. The old playbooks aren&#8217;t just outdated&#8212;they&#8217;re dangerous.</p><h2>The Agentic Shift: AI Moves From Assistant to Adversary</h2><p>The defining characteristic of the 2026 threat landscape is the transition from generative AI as a content creation tool to agentic AI as an operational execution engine. Adversaries are no longer simply using large language models to craft phishing emails. They&#8217;re deploying autonomous agents capable of navigating networks, identifying high-value data, and executing exfiltration protocols without human intervention.</p><p>These &#8220;shadow agents&#8221; operate continuously, process vast amounts of network telemetry, and find subtle vulnerabilities that human operators miss. The industrialisation of social engineering has reached unprecedented sophistication&#8212;Check Point Software reports a 500% surge in &#8220;ClickFix&#8221; techniques, where AI generates context-aware lures in real-time based on individual user behaviour and role-specific context.</p><p>The emergence of autonomous malware that rewrites its own code to evade signature-based detection represents a fundamental escalation. Capabilities once exclusive to elite nation-state actors are now accessible to criminal groups. The &#8220;AI Arms Race&#8221; described by Google Cloud isn&#8217;t a prediction&#8212;it&#8217;s our current operational reality.</p><p>Deepfake weaponization has moved from theoretical risk to potent operational tool. The Arup incident earlier this year&#8212;where AI-generated video facilitated a $25 million theft by impersonating a CFO during a video conference&#8212;demonstrates that traditional human verification methods are now obsolete for high-stakes transactions.</p><h2>Identity: The New Battlefield</h2><p>With traditional network perimeters dissolved by cloud adoption and remote work, identity has become the primary control point&#8212;and the primary target. Reports indicate 97% of identity-based attacks involve credential abuse rather than vulnerability exploitation. Adversaries don&#8217;t need to hack in; they simply log in.</p><p>The volume of stolen credentials available on dark web marketplaces has reached critical mass, with 149 million passwords exposed in a single late-January leak. Multi-factor authentication bypasses have been industrialised&#8212;token theft, session hijacking, and &#8220;quishing&#8221; (QR code phishing) are now standard tradecraft. The FBI has issued specific warnings about North Korean groups using embedded malicious QR codes to force victims from secured corporate devices to less-secure mobile devices, effectively bypassing endpoint protection entirely.</p><p>A critical new category has emerged: non-human identity risk. As organisations deploy authorised AI agents for productivity, these entities receive permissions to access sensitive data and execute actions. Adversaries are now targeting these &#8220;silicon employees,&#8221; exploiting their entitlements to gain access that would otherwise trigger anomalies if attempted by human users.</p><h2>The Typhoon Strategy: Nation-State Operations Intensify</h2><p>Chinese state-sponsored cyber activity remains the most persistent and sophisticated threat to Western infrastructure. The Salt Typhoon campaign has become a central geopolitical crisis, with systematic infiltration of global telecommunications networks&#8212;including confirmation of a ninth US telecom firm compromised this month.</p><p>The strategic objective is clear: counterintelligence and monitoring of high-value targets. By compromising core switching and routing infrastructure, Salt Typhoon can intercept communications metadata and content, effectively wiretapping the wiretappers. Data exfiltrated includes call records, text messages, and geolocation data from senior government officials and prominent political figures.</p><p>Volt Typhoon continues targeting US critical infrastructure&#8212;energy, water, transportation&#8212;for &#8220;pre-positioning.&#8221; The strategic intent is maintaining persistent access that could be leveraged to disrupt communications and logistics in the event of kinetic conflict in the Indo-Pacific. Throughout January, Volt Typhoon has been observed attempting to re-establish access to networks from which they were previously evicted.</p><p>Meanwhile, Russian operations under Midnight Blizzard continue exploiting information from previous high-profile breaches to target downstream customers. Their tradecraft has evolved to focus on identity providers and cloud trust relationships, making detection extraordinarily difficult.</p><h2>The Ransomware Economy Restructures</h2><p>The ransomware ecosystem has undergone structural transformation. While attack frequency has increased, ransom payments have declined 50% compared to last year&#8212;driven by improved backup resilience and a cultural shift toward refusal. Sixty-four percent of victims now refuse payment on principle.</p><p>In response, attackers have pivoted to pure data extortion. Encryption is frequently skipped entirely; instead, actors exfiltrate sensitive data and threaten public release. This reduces technical overhead while maintaining leverage over victims who fear reputational damage and regulatory fines more than operational downtime.</p><p>The monolithic ransomware cartels have fragmented into a decentralised ecosystem of smaller, specialised groups. The collapse of Black Basta following the &#8220;ExploitWhispers Leak&#8221; validates the strategy of psychological warfare against ransomware groups&#8212;sowing distrust among criminals can be as effective as technical takedowns.</p><h2>The Agentic SOC Emerges</h2><p>To counter machine-speed attacks, the industry has moved decisively toward the &#8220;Agentic SOC.&#8221; Major vendors including CrowdStrike, Microsoft, and Google have rolled out autonomous capabilities that independently triage alerts, correlate telemetry across disparate tools, and execute remediation playbooks without human approval for routine incidents.</p><p>Early adopters report 90% reduction in mean time to conclusion for routine investigations. Human analysts are transitioning from &#8220;alert factory workers&#8221; to AI supervisors and strategic threat hunters. The AI handles the noise; the human handles the nuance.</p><p>However, deployment challenges remain significant. The &#8220;black box&#8221; trust issue persists&#8212;security leaders remain wary of granting autonomous write-access to AI agents due to hallucination risks that could cause business disruption. Data sovereignty concerns complicate cloud-based LLM processing of sensitive security telemetry, particularly under GDPR and DORA.</p><h2>Critical Vulnerabilities Demand Immediate Attention</h2><p>January has been punctuated by high-severity zero-days requiring emergency response. The Fortinet FortiCloud SSO bypass (CVE-2026-24858) was so severe that Fortinet temporarily disabled the service globally to stop exploitation&#8212;an unprecedented step highlighting systemic risk in centralised cloud management planes.</p><p>The Cisco Unified Communications Manager vulnerability (CVE-2026-20045) has been heavily targeted by state-sponsored actors seeking to intercept communications. Microsoft&#8217;s January Patch Tuesday addressed 114 vulnerabilities including three actively exploited zero-days affecting Desktop Window Manager, Office security features, and Secure Boot.</p><p>Ivanti Connect Secure continues struggling with edge device security, with new vulnerabilities being exploited by Chinese nexus groups to deploy web shells on VPN gateways.</p><h2>Regulatory Landscape Tightens</h2><p>The EU&#8217;s Digital Operational Resilience Act (DORA) has entered its first full year of enforcement, with the Article 58 Review determining whether requirements will extend to statutory auditors. Financial entities are scrambling to complete third-party registers and prepare for threat-led penetration testing.</p><p>The UK&#8217;s Cyber Security and Resilience Bill has passed its second reading, expanding scope to include managed service providers and data centres while introducing mandatory incident reporting for ransomware.</p><p>In India, friction mounts over accelerated timelines for the Digital Personal Data Protection Act, with the proposed 12-month compliance window threatening smaller organisations&#8217; viability.</p><h2>Strategic Imperatives for 2026</h2><p>The poly-crisis demands a fundamental shift in how organisations approach security:</p><p><strong>Assume compromise.</strong> The perimeter is gone. Resilience must be built on the assumption that adversaries are already inside. Zero trust isn&#8217;t a product&#8212;it&#8217;s an operating philosophy.</p><p><strong>Embrace agentic defence.</strong> Manual security operations cannot scale to meet machine-speed attacks. Supervised autonomous security agents are no longer optional&#8212;they&#8217;re a necessity for survival.</p><p><strong>Decouple from centralised failures.</strong> Over-reliance on single points of failure is systemic risk. The Fortinet SSO crisis demonstrates how a single vulnerability in a cloud provider can compromise thousands of downstream devices. Diversification and break-glass continuity plans are essential.</p><p><strong>Prioritise identity fabric.</strong> With 97% of attacks involving credential abuse, identity security isn&#8217;t just an IT concern&#8212;it&#8217;s the cornerstone of organisational resilience. Phishing-resistant MFA, identity threat detection, and non-human identity management must be priority investments.</p><p><strong>Prepare for the quantum transition.</strong> While Q-Day remains years away, the &#8220;harvest now, decrypt later&#8221; threat means organisations handling long-lived secrets must begin crypto-agility planning now. The 2035 deadline for US federal quantum-safe migration should guide private sector timelines.</p><h2>Looking Ahead</h2><p>The year 2026 will not be defined by prevention of attacks but by the speed and intelligence of response. Navigating the poly-crisis requires a fusion of advanced technology, rigorous compliance, and geopolitical awareness. The decisions made by security leaders this year will define organisational resilience for the decade to come.</p><div><hr></div><p><em>Samuel Odekunle is Managing Partner at MustardTree Partners, specialising in cybersecurity strategy, identity and access management, and digital transformation.</em></p><p><em>State of Security is published monthly. Subscribe for the latest analysis on the evolving threat landscape.</em></p><div><hr></div><p><em>&#169; 2026 MustardTree Partners (Part of the MustardTree Group). All rights reserved.</em></p>]]></content:encoded></item><item><title><![CDATA[Quantum Threat: Why You Need to Think About HNDL Today]]></title><description><![CDATA[Somewhere, right now, a state-sponsored actor is quietly siphoning encrypted traffic from major financial institutions, government networks, and healthcare systems.]]></description><link>https://blog.mustardtreegroup.com/p/quantum-threat-why-you-need-to-think</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/quantum-threat-why-you-need-to-think</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Thu, 29 Jan 2026 11:30:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zsdm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zsdm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zsdm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zsdm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zsdm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zsdm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zsdm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg" width="945" height="529" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:529,&quot;width&quot;:945,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:366031,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.lgger.com/i/186182200?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zsdm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zsdm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zsdm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zsdm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc49bd72-3471-46ad-a14a-765c49f57d53_945x529.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>S<em>omewhere, right now, a state-sponsored actor is quietly siphoning encrypted traffic from major financial institutions, government networks, and healthcare systems. They can</em>&#8217;<em>t read any of it. Not yet. But they</em>&#8217;<em>re not trying to. They</em>&#8217;<em>re waiting.</em></p><p>This is the world of <strong>Harvest Now, Decrypt Later</strong> (HNDL), a cybersecurity threat that&#8217;s already happening but won&#8217;t hurt you until it does. It&#8217;s the ultimate long game, and if you&#8217;re not already thinking about it, you&#8217;re already behind.</p><h2><strong>What is HNDL? (And Why Should You Care?)</strong></h2><p>HNDL is elegantly simple and terrifyingly patient. Adversaries intercept and store encrypted data today, knowing that quantum computers will eventually be powerful enough to crack today&#8217;s encryption algorithms. Your RSA-2048 keys? Your elliptic curve cryptography? Once a sufficiently powerful quantum computer running Shor&#8217;s algorithm comes online, those mathematical safeguards become little more than a polite suggestion.</p><blockquote><p><em><a href="https://en.wikipedia.org/wiki/Elliptic-curve_cryptography">Elliptic Curve Cryptography (ECC)</a> is an asymmetric encryption algorithm that leverages the algebraic structure of elliptic curves over finite fields. It is used for public-key encryption, providing the same level of security as RSA but with significantly smaller key sizes.</em></p></blockquote><p>The kicker? The data doesn&#8217;t need to be valuable right now. It needs to be valuable <em>when it</em>&#8217;<em>s decrypted</em>. Think about it: personnel records, medical histories, national security communications, financial transactions, trade secrets, merger and acquisition details. These don&#8217;t become less sensitive with age. A 15-year-old government communication about intelligence operations is still classified. Medical records remain sensitive for a lifetime. And that brilliant innovation your R&amp;D team is working on? Your competitors would still love to know about it in a decade.</p><h2><strong>Enter Mosca&#8217;s Theorem: Your New Best Friend</strong></h2><p><a href="https://perimeterinstitute.ca/people/michele-mosca">Dr. Michele Mosca,</a> a cryptography expert and co-founder of the Institute for Quantum Computing at the University of Waterloo, gave us a beautifully simple framework for understanding why we can&#8217;t afford to wait. It&#8217;s called Mosca&#8217;s Theorem, and it boils down to an inequality that should keep every CISO up at night:</p><p><strong>If X + Y &gt; Z, you have a problem.</strong></p><p>Where:</p><p><strong>X</strong> = How long your data needs to remain confidential (the <em>shelf life</em> of your secrets)</p><p><strong>Y</strong> = How long it will take to migrate your systems to quantum-resistant cryptography (your <em>migration time</em>)</p><p><strong>Z</strong> = How long until a cryptographically relevant quantum computer arrives (<em>Q-Day</em>)</p><p>Let&#8217;s make this painfully real. You&#8217;re a financial services firm with customer data that needs to remain confidential for, say, 20 years (regulatory requirements, customer relationships, the works). Your IT team estimates a full cryptographic migration will take 5 years. That&#8217;s X + Y = 25 years.</p><p>Now, expert consensus is coalescing around Q-Day occurring somewhere in the early-to-mid 2030s &#8212; let&#8217;s be generous and say 2035. That&#8217;s roughly 10 years from now (Z = 10).</p><p><strong>25 &gt; 10. </strong>Houston, we have a problem.</p><p>And here&#8217;s the uncomfortable truth that Mosca&#8217;s Theorem reveals: by the time Q-Day arrives, your data has <em>already been harvested</em>. The breach happened years ago &#8212; you just haven&#8217;t felt it yet.</p><h2><strong>Why Senior Leadership Need to Lead This Conversation</strong></h2><p>I&#8217;ve seen it too often: quantum computing gets treated as a &#8220;future problem&#8221; or, worse, dismissed as science fiction. &#8220;We&#8217;ll deal with it when it&#8217;s real,&#8221; they say, while conveniently ignoring that adversaries are harvesting encrypted traffic <em><strong>right now</strong></em>.</p><p>This isn&#8217;t a junior analyst problem. This isn&#8217;t something you can delegate to the next security committee. The HNDL threat requires senior leadership because:</p><ol><li><p><strong>The timelines are measured in years, not sprints.</strong> <a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">NIST has set 2035 as the deadline for federal systems to complete their migration to post-quantum cryptography (PQC)</a>. The EU is even more aggressive, requiring critical infrastructure to be quantum-safe by 2030. These aren&#8217;t aspirational targets &#8212; they&#8217;re regulatory expectations.</p></li><li><p><strong>Migration is complex.</strong> This isn&#8217;t a <a href="https://en.wikipedia.org/wiki/Patch_Tuesday">patch Tuesday</a> fix. We&#8217;re talking about discovering every cryptographic dependency in your enterprise, prioritizing assets based on data sensitivity and exposure, testing new algorithms for compatibility and performance, and deploying across potentially thousands of systems and devices. Some organisations took years just to deprecate SHA-1. PQC migration makes that look like changing a password.</p></li><li><p><strong>The business case is counterintuitive.</strong> You&#8217;re asking executives to invest significant resources to protect against a threat that hasn&#8217;t materialized yet, to prevent a breach that may have already happened, resulting in damage that won&#8217;t be visible for years. That&#8217;s a difficult conversation that requires credibility and influence.</p></li></ol><h2><strong>What Can You Do Today?</strong></h2><ul><li><p><strong>Conduct a Cryptographic Inventory.</strong> You can&#8217;t protect what you don&#8217;t know about. Map every system, application, and data flow that uses public-key cryptography. Yes, this is tedious. Yes, it&#8217;s essential.</p></li><li><p><strong>Classify Data by Sensitivity Lifespan.</strong> Not all data is created equal. Personnel records have different longevity requirements than marketing materials. Apply Mosca&#8217;s X variable to your data classification scheme.</p></li><li><p><strong>Develop Crypto-Agility.</strong> Build systems that can swap cryptographic algorithms without wholesale replacement. This isn&#8217;t just about quantum &#8212; it&#8217;s good security hygiene that will serve you well regardless of how the threat landscape evolves.</p></li><li><p><strong>Start Testing NIST-Approved PQC Algorithms.</strong> NIST finalized its first set of post-quantum cryptography standards in August 2024 (FIPS 203, 204, and 205). These aren&#8217;t theoretical &#8212; they&#8217;re ready for piloting. Major players like Apple, Google, and Cloudflare are already deploying hybrid quantum-safe encryption.</p></li><li><p><strong>Educate Your Leadership.</strong> Use Mosca&#8217;s Theorem as a communication tool. Its simplicity makes the quantum threat tangible: &#8220;Here&#8217;s how long our data needs protection. Here&#8217;s how long migration takes. Here&#8217;s when the threat arrives. Do the maths.&#8221;</p></li></ul><p>As senior IT professionals, we have a choice: we can wait for Q-Day to arrive and scramble to respond, or we can start the migration now and be ready when the storm hits. The cost of preparation is measured in budget and effort. The cost of being late is measured in data breaches, regulatory penalties, reputational damage, and the uncomfortable knowledge that we saw this coming and chose to look the other way.</p><p>The quantum clock is ticking.</p><div><hr></div><p><em>Sam Odekunle is a Cybersecurity Consultant specialising in Identity and Access Management, currently leading enterprise IDAM transformation programmes. He writes about the intersection of cybersecurity, governance, and emerging threats.</em></p>]]></content:encoded></item><item><title><![CDATA[Identity in Microservices ]]></title><description><![CDATA[A view on Service-to-Service Authentication Patterns]]></description><link>https://blog.mustardtreegroup.com/p/identity-in-microservices</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/identity-in-microservices</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Wed, 06 Aug 2025 12:00:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!m2pT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!m2pT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!m2pT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg 424w, https://substackcdn.com/image/fetch/$s_!m2pT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg 848w, https://substackcdn.com/image/fetch/$s_!m2pT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!m2pT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!m2pT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg" width="1456" height="967" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:967,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:553617,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.lgger.com/i/170063390?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!m2pT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg 424w, https://substackcdn.com/image/fetch/$s_!m2pT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg 848w, https://substackcdn.com/image/fetch/$s_!m2pT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!m2pT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F079de793-37fd-4864-958e-cfe7f063bb7c_4288x2848.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Microservices architectures promise scalability and flexibility, but they transform security from a single perimeter problem into a distributed trust challenge. When your application becomes dozens of services communicating across network boundaries, every inter-service call becomes a potential attack vector.</p><p>Unlike monolithic applications where components communicate through in-memory calls or local databases, microservices must authenticate each request over the network. A compromised service can potentially impersonate others, access unauthorised data, or pivot through your entire system. Traditional approaches like shared secrets or IP-based trust fall apart at scale.</p><p>The stakes are higher than inconvenience&#8202;&#8212;&#8202;service identity failures can lead to data breaches, privilege escalation, and compliance violations. Consider an e-commerce platform where the recommendation service gains unauthorised access to payment processing, or a healthcare system where diagnostic services can access patient records beyond their authorisation scope.</p><p>This article examines three battle-tested patterns for securing service-to-service communication: <strong>mutual TLS (mTLS)</strong> for cryptographic identity verification, <strong>Service Mesh Identity</strong> for infrastructure-managed authentication, and <strong>Token Relay</strong> patterns for propagating user context through service chains. Each approach addresses different architectural needs and operational constraints.</p><h3>Identity in Microservices: Service-to-Service Authentication Patterns</h3><p>Microservices architectures promise scalability and flexibility, but they transform security from a single perimeter problem into a distributed trust challenge. When your application becomes dozens of services communicating across network boundaries, every inter-service call becomes a potential attack vector.</p><p>Unlike monolithic applications where components communicate through in-memory calls or local databases, microservices must authenticate each request over the network. A compromised service can potentially impersonate others, access unauthorised data, or pivot through your entire system. Traditional approaches like shared secrets or IP-based trust fall apart at scale.</p><p>The stakes are higher than inconvenience&#8202;&#8212;&#8202;service identity failures can lead to data breaches, privilege escalation, and compliance violations. Consider an e-commerce platform where the recommendation service gains unauthorised access to payment processing, or a healthcare system where diagnostic services can access patient records beyond their authorisation scope.</p><p>This article examines three battle-tested patterns for securing service-to-service communication: <strong>mutual TLS (mTLS)</strong> for cryptographic identity verification, <strong>Service Mesh Identity</strong> for infrastructure-managed authentication, and <strong>Token Relay</strong> patterns for propagating user context through service chains.</p><h3>Mutual TLS (mTLS): Cryptographic Service Identity</h3><p>Mutual TLS extends standard TLS by requiring both client and server to present valid certificates, creating bidirectional authentication. In microservices architectures, this means every service acts as both client and server, presenting its identity certificate for each connection.</p><h3>mTLS Implementation Architecture</h3><pre><code># Certificate Authority Structure
Root CA
&#9500;&#9472;&#9472; Intermediate CA (Infrastructure)
&#9474;   &#9500;&#9472;&#9472; Service A Certificate
&#9474;   &#9500;&#9472;&#9472; Service B Certificate
&#9474;   &#9492;&#9472;&#9472; API Gateway Certificate
&#9492;&#9472;&#9472; Intermediate CA (External)
    &#9492;&#9472;&#9472; Client Certificates</code></pre><p>The mTLS handshake process involves six distinct steps:</p><ol><li><p><strong>Client initiates connection</strong> with ClientHello message</p></li><li><p><strong>Server presents certificate</strong> containing its public key and identity claims</p></li><li><p><strong>Client verifies server certificate</strong> against trusted CA bundle</p></li><li><p><strong>Server requests client certificate</strong> via CertificateRequest message</p></li><li><p><strong>Client presents certificate</strong> and signs a challenge with its private key</p></li><li><p><strong>Server verifies client certificate</strong> and establishes encrypted channel</p></li></ol><h3>Practical mTLS Implementation</h3><p>Here&#8217;s how to implement mTLS in a Go microservice:</p><pre><code>package main</code></pre><pre><code>import (
    "crypto/tls"
    "crypto/x509"
    "fmt"
    "io/ioutil"
    "net/http"
)</code></pre><pre><code>func setupMTLSServer() *http.Server {
    // Load server certificate and key
    serverCert, err := tls.LoadX509KeyPair("server.crt", "server.key")
    if err != nil {
        panic(err)
    }
    
    // Load CA certificate for client verification
    caCert, err := ioutil.ReadFile("ca.crt")
    if err != nil {
        panic(err)
    }
    
    caCertPool := x509.NewCertPool()
    caCertPool.AppendCertsFromPEM(caCert)
    
    tlsConfig := &amp;tls.Config{
        Certificates: []tls.Certificate{serverCert},
        ClientAuth:   tls.RequireAndVerifyClientCert,
        ClientCAs:    caCertPool,
        MinVersion:   tls.VersionTLS12,
        CipherSuites: []uint16{
            tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
            tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
        },
    }
    
    return &amp;http.Server{
        Addr:      ":8443",
        TLSConfig: tlsConfig,
    }
}</code></pre><pre><code>func setupMTLSClient() *http.Client {
    clientCert, err := tls.LoadX509KeyPair("client.crt", "client.key")
    if err != nil {
        panic(err)
    }
    
    caCert, err := ioutil.ReadFile("ca.crt")
    if err != nil {
        panic(err)
    }
    
    caCertPool := x509.NewCertPool()
    caCertPool.AppendCertsFromPEM(caCert)
    
    tlsConfig := &amp;tls.Config{
        Certificates: []tls.Certificate{clientCert},
        RootCAs:      caCertPool,
        MinVersion:   tls.VersionTLS12,
    }
    
    return &amp;http.Client{
        Transport: &amp;http.Transport{
            TLSClientConfig: tlsConfig,
        },
    }
}</code></pre><h3>Certificate Lifecycle Management</h3><p>The biggest operational challenge with mTLS is certificate management at scale. Consider these automation strategies:</p><p><strong>Automated Certificate Provisioning:</strong></p><pre><code># cert-manager Kubernetes integration
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
  name: service-a-cert
  namespace: production
spec:
  secretName: service-a-tls
  issuerRef:
    name: internal-ca-issuer
    kind: ClusterIssuer
  commonName: service-a.production.svc.cluster.local
  dnsNames:
  - service-a.production.svc.cluster.local
  duration: 720h # 30 days
  renewBefore: 240h # Renew 10 days before expiry</code></pre><p><strong>Certificate Rotation Strategy:</strong></p><ul><li><p>Implement overlapping validity periods (old and new certificates valid simultaneously)</p></li><li><p>Use certificate serial numbers or thumbprints for cache invalidation</p></li><li><p>Monitor certificate expiry across all services with alerting</p></li></ul><h3>mTLS Performance Considerations</h3><p>mTLS introduces latency overhead, particularly during the initial handshake:</p><pre><code>Typical mTLS Handshake Overhead:
- Additional RTT for certificate exchange: 1-2ms
- Certificate validation: 0.5-1ms  
- Cryptographic operations: 0.1-0.5ms
Total: ~2-4ms per new connection</code></pre><p>Mitigation strategies include:</p><ul><li><p><strong>Connection pooling</strong> to amortise handshake costs</p></li><li><p><strong>Session resumption</strong> using TLS session tickets</p></li><li><p><strong>Certificate caching</strong> to avoid repeated validation</p></li><li><p><strong>Hardware acceleration</strong> for cryptographic operations</p></li></ul><h3>When to Choose mTLS</h3><p><strong>Ideal scenarios:</strong></p><ul><li><p>High-security environments (financial services, healthcare)</p></li><li><p>Compliance requirements mandating cryptographic authentication</p></li><li><p>Services with predictable, long-lived connections</p></li><li><p>Infrastructure you fully control (no third-party dependencies)</p></li></ul><p><strong>Avoid mTLS when:</strong></p><ul><li><p>Rapid service deployment cycles make certificate management burdensome</p></li><li><p>Performance requirements are extremely stringent</p></li><li><p>Third-party services don&#8217;t support client certificates</p></li><li><p>Development teams lack PKI expertise</p></li></ul><h3>Service Mesh Identity: Infrastructure-Managed Security</h3><p>Service meshes abstract away the complexity of mTLS by handling certificate provisioning, rotation, and policy enforcement at the infrastructure layer. Popular implementations include Istio, Linkerd, and Consul Connect.</p><h3>SPIFFE/SPIRE Identity Framework</h3><p>Most service meshes implement the SPIFFE (Secure Production Identity Framework for Everyone) specification:</p><pre><code># SPIFFE Identity Document (SVID)
{
  "sub": "spiffe://example.com/payment-service",
  "aud": ["spiffe://example.com/api-gateway"],
  "exp": 1640995200,
  "iat": 1640908800,
  "spiffe_id": "spiffe://example.com/payment-service",
  "workload_selectors": {
    "k8s:deployment": "payment-service",
    "k8s:namespace": "production"
  }
}</code></pre><h3>Istio Service Mesh Implementation</h3><p>Here&#8217;s how Istio handles service identity and mTLS:</p><pre><code># Automatic mTLS enforcement
apiVersion: security.istio.io/v1beta1
kind: PeerAuthentication
metadata:
  name: default
  namespace: production
spec:
  mtls:
    mode: STRICT
---
# Fine-grained authorization policy
apiVersion: security.istio.io/v1beta1
kind: AuthorizationPolicy
metadata:
  name: payment-service-policy
  namespace: production
spec:
  selector:
    matchLabels:
      app: payment-service
  rules:
  - from:
    - source:
        principals: ["cluster.local/ns/production/sa/api-gateway"]
  - to:
    - operation:
        methods: ["POST"]
        paths: ["/payments/*"]
    when:
    - key: request.headers[user-role]
      values: ["admin", "payment-processor"]</code></pre><h3>Sidecar Proxy Architecture</h3><p>Service meshes deploy sidecar proxies (typically Envoy) alongside each service:</p><pre><code>&#9484;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9488;    &#9484;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9488;
&#9474;   Service A     &#9474;    &#9474;   Service B     &#9474;
&#9474;                 &#9474;    &#9474;                 &#9474;
&#9474; &#9484;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9488; &#9474;    &#9474; &#9484;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9488; &#9474;
&#9474; &#9474; App Process &#9474; &#9474;    &#9474; &#9474; App Process &#9474; &#9474;
&#9474; &#9492;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9496; &#9474;    &#9474; &#9492;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9496; &#9474;
&#9474; &#9484;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9488; &#9474;    &#9474; &#9484;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9488; &#9474;
&#9474; &#9474;Envoy Sidecar&#9474;&#9668;&#9532;&#9472;&#9472;&#9472;&#9472;&#9532;&#9658;&#9474;Envoy Sidecar&#9474; &#9474;
&#9474; &#9492;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9496; &#9474;    &#9474; &#9492;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9496; &#9474;
&#9492;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9496;    &#9492;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9496;
        &#9474;                        &#9474;
        &#9492;&#9472;&#9472;&#9472;&#9472;&#9472;&#9472; mTLS Tunnel &#9472;&#9472;&#9472;&#9472;&#9472;&#9472;&#9496;</code></pre><p>The sidecar handles:</p><ul><li><p><strong>Certificate management</strong>: Automatic provisioning and rotation</p></li><li><p><strong>Traffic interception</strong>: Transparent proxy for all network communications</p></li><li><p><strong>Policy enforcement</strong>: Authorization rules and traffic routing</p></li><li><p><strong>Observability</strong>: Metrics, tracing, and access logs</p></li></ul><h3>Service Mesh Performance Impact</h3><p>Sidecar proxies introduce resource overhead:</p><pre><code>Typical Resource Overhead:
- Memory: 50-100MB per sidecar
- CPU: 0.1-0.2 cores per sidecar
- Network latency: 0.5-2ms additional hop
- Throughput impact: 5-15% reduction</code></pre><p>Optimisation strategies:</p><ul><li><p><strong>Resource limits</strong> tuned to workload requirements</p></li><li><p><strong>Proxy configuration</strong> optimised for specific traffic patterns</p></li><li><p><strong>Selective deployment</strong> only for services requiring mesh features</p></li><li><p><strong>Hardware acceleration</strong> for cryptographic operations</p></li></ul><h3>Service Mesh Decision Matrix</h3><p><strong>Choose service mesh when:</strong></p><ul><li><p>Operating at significant scale (50+ services)</p></li><li><p>Requiring consistent security policies across services</p></li><li><p>Teams lack deep networking/security expertise</p></li><li><p>Compliance requires comprehensive audit trails</p></li><li><p>Need advanced traffic management (canary deployments, circuit breaking)</p></li></ul><p><strong>Avoid service mesh when:</strong></p><ul><li><p>Simple architectures with few services</p></li><li><p>Extremely latency-sensitive applications</p></li><li><p>Limited operational resources for mesh management</p></li><li><p>Services primarily communicate with external systems</p></li></ul><h3>Token Relay Pattern: Propagating User Context</h3><p>Token relay patterns maintain user context across service boundaries by forwarding authentication tokens through the service call chain. This approach combines service authentication with user authorisation.</p><h3>JWT-Based Implementation</h3><pre><code>// API Gateway - Initial token validation and relay
const jwt = require('jsonwebtoken');
const axios = require('axios');</code></pre><pre><code>class APIGateway {
    async authenticateAndRelay(req, res) {
        try {
            // Validate incoming JWT
            const token = req.headers.authorization?.replace('Bearer ', '');
            const decoded = jwt.verify(token, process.env.JWT_SECRET);
            
            // Enrich token with service-specific claims
            const serviceToken = jwt.sign({
                ...decoded,
                iss: 'api-gateway',
                aud: 'internal-services',
                service_chain: ['api-gateway'],
                request_id: req.headers['x-request-id']
            }, process.env.SERVICE_JWT_SECRET, {
                expiresIn: '5m' // Short-lived for internal use
            });
            
            // Forward to downstream service
            const response = await axios.post(
                'https://payment-service/process',
                req.body,
                {
                    headers: {
                        'Authorization': `Bearer ${serviceToken}`,
                        'X-Original-Token': token,
                        'X-Request-ID': req.headers['x-request-id']
                    }
                }
            );
            
            res.json(response.data);
        } catch (error) {
            res.status(401).json({ error: 'Authentication failed' });
        }
    }
}</code></pre><h3>Service-to-Service Token Validation</h3><pre><code>package main</code></pre><pre><code>import (
    "context"
    "fmt"
    "net/http"
    "strings"
    "time"
    
    "github.com/golang-jwt/jwt/v4"
)</code></pre><pre><code>type ServiceClaims struct {
    UserID       string   `json:"user_id"`
    Roles        []string `json:"roles"`
    ServiceChain []string `json:"service_chain"`
    RequestID    string   `json:"request_id"`
    jwt.RegisteredClaims
}</code></pre><pre><code>func validateServiceToken(tokenString string) (*ServiceClaims, error) {
    token, err := jwt.ParseWithClaims(tokenString, &amp;ServiceClaims{}, func(token *jwt.Token) (interface{}, error) {
        if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {
            return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"])
        }
        return []byte(os.Getenv("SERVICE_JWT_SECRET")), nil
    })
    
    if err != nil {
        return nil, err
    }
    
    if claims, ok := token.Claims.(*ServiceClaims); ok &amp;&amp; token.Valid {
        // Validate audience and issuer
        if !claims.VerifyAudience("internal-services", true) {
            return nil, fmt.Errorf("invalid audience")
        }
        
        // Check service chain for loop detection
        if contains(claims.ServiceChain, "payment-service") {
            return nil, fmt.Errorf("circular service call detected")
        }
        
        return claims, nil
    }
    
    return nil, fmt.Errorf("invalid token")
}</code></pre><pre><code>func authMiddleware(next http.HandlerFunc) http.HandlerFunc {
    return func(w http.ResponseWriter, r *http.Request) {
        authHeader := r.Header.Get("Authorization")
        if authHeader == "" {
            http.Error(w, "Missing authorization header", http.StatusUnauthorized)
            return
        }
        
        tokenString := strings.TrimPrefix(authHeader, "Bearer ")
        claims, err := validateServiceToken(tokenString)
        if err != nil {
            http.Error(w, "Invalid token: "+err.Error(), http.StatusUnauthorized)
            return
        }
        
        // Add claims to request context
        ctx := context.WithValue(r.Context(), "claims", claims)
        next.ServeHTTP(w, r.WithContext(ctx))
    }
}</code></pre><h3>Token Security Considerations</h3><p><strong>Token Scoping</strong>: Implement different token types for different contexts:</p><pre><code>{
  "user_token": {
    "sub": "user123",
    "aud": ["web-app"],
    "scope": "read:profile write:profile",
    "exp": 3600
  },
  "service_token": {
    "sub": "service:api-gateway", 
    "aud": ["internal-services"],
    "scope": "service:call",
    "exp": 300,
    "service_chain": ["api-gateway"]
  }
}</code></pre><p><strong>Token Refresh Strategy</strong>: Implement sliding window refresh for long-running operations:</p><pre><code>class TokenManager:
    def __init__(self, refresh_threshold=300):  # 5 minutes
        self.refresh_threshold = refresh_threshold
        
    async def get_valid_token(self, current_token):
        try:
            payload = jwt.decode(current_token, verify=False)
            exp = payload.get('exp', 0)
            
            # Refresh if token expires within threshold
            if exp - time.time() &lt; self.refresh_threshold:
                return await self.refresh_token(current_token)
                
            return current_token
        except:
            # Token invalid, request new one
            return await self.authenticate()</code></pre><h3>Token Relay Performance Optimization</h3><p><strong>Token Caching Strategy:</strong></p><pre><code>import redis
from datetime import timedelta</code></pre><pre><code>class TokenCache:
    def __init__(self):
        self.redis_client = redis.Redis(host='localhost', port=6379, db=0)
        
    def cache_token(self, user_id, token, expiry):
        # Cache with 90% of actual expiry to ensure validity
        cache_expiry = int(expiry * 0.9)
        self.redis_client.setex(
            f"token:{user_id}", 
            cache_expiry, 
            token
        )
        
    def get_cached_token(self, user_id):
        cached_token = self.redis_client.get(f"token:{user_id}")
        if cached_token:
            # Validate token is still usable
            if self.validate_token_locally(cached_token):
                return cached_token.decode('utf-8')
        return None</code></pre><h3>When to Use Token Relay</h3><p><strong>Ideal scenarios:</strong></p><ul><li><p>Need to maintain user context across service boundaries</p></li><li><p>Implementing fine-grained, user-specific authorization</p></li><li><p>Services require different permissions based on user roles</p></li><li><p>Audit trails must track user actions across services</p></li></ul><p><strong>Avoid token relay when:</strong></p><ul><li><p>Service-to-service calls don&#8217;t require user context</p></li><li><p>Extremely high-throughput scenarios where token overhead matters</p></li><li><p>Services are purely internal with no user-facing authorization requirements</p></li></ul><h3>Hybrid Approaches and Decision Framework</h3><p>Real-world systems often combine multiple patterns. Consider this hybrid architecture:</p><pre><code>Internet &#8594; [API Gateway] &#8594; [Service Mesh] &#8594; [Internal Services]
           &#8595;               &#8595;                 &#8595;
       JWT Validation   mTLS + Identity    Token + mTLS
       Token Relay      Service Policies   Authorization</code></pre><h3>Decision Matrix</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!k2Vk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441546ae-ad59-40e3-95f2-4a4e94446481_687x222.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!k2Vk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441546ae-ad59-40e3-95f2-4a4e94446481_687x222.png 424w, https://substackcdn.com/image/fetch/$s_!k2Vk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441546ae-ad59-40e3-95f2-4a4e94446481_687x222.png 848w, https://substackcdn.com/image/fetch/$s_!k2Vk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441546ae-ad59-40e3-95f2-4a4e94446481_687x222.png 1272w, https://substackcdn.com/image/fetch/$s_!k2Vk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441546ae-ad59-40e3-95f2-4a4e94446481_687x222.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!k2Vk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441546ae-ad59-40e3-95f2-4a4e94446481_687x222.png" width="687" height="222" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/441546ae-ad59-40e3-95f2-4a4e94446481_687x222.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:222,&quot;width&quot;:687,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!k2Vk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441546ae-ad59-40e3-95f2-4a4e94446481_687x222.png 424w, https://substackcdn.com/image/fetch/$s_!k2Vk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441546ae-ad59-40e3-95f2-4a4e94446481_687x222.png 848w, https://substackcdn.com/image/fetch/$s_!k2Vk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441546ae-ad59-40e3-95f2-4a4e94446481_687x222.png 1272w, https://substackcdn.com/image/fetch/$s_!k2Vk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F441546ae-ad59-40e3-95f2-4a4e94446481_687x222.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3>Implementation Roadmap</h3><p><strong>Phase 1: Foundation (Months 1&#8211;2)</strong></p><ul><li><p>Implement token relay for user-facing services</p></li><li><p>Establish certificate authority for internal services</p></li><li><p>Deploy basic mTLS between critical services</p></li></ul><p><strong>Phase 2: Scale (Months 3&#8211;4)</strong></p><ul><li><p>Evaluate service mesh for complex deployments</p></li><li><p>Implement automated certificate management</p></li><li><p>Add comprehensive monitoring and alerting</p></li></ul><p><strong>Phase 3: Optimization (Months 5&#8211;6)</strong></p><ul><li><p>Fine-tune performance based on production metrics</p></li><li><p>Implement advanced authorization policies</p></li><li><p>Establish security incident response procedures</p></li></ul><h3>Monitoring and Observability</h3><p>Effective monitoring is crucial for service identity systems:</p><pre><code># Key metrics to track
authentication_requests_total: 
  - Counter of authentication attempts by service, method, result
  
authentication_duration_seconds:
  - Histogram of authentication latency by method
  
certificate_expiry_days:
  - Gauge of days until certificate expiry by service
  
token_validation_errors_total:
  - Counter of token validation failures by error type
  
service_mesh_connection_failures_total:  
  - Counter of mTLS connection failures by source/destination</code></pre><h3>TLDR;</h3><p>Service-to-service authentication in microservices requires careful consideration of security requirements, operational complexity, and performance constraints. mTLS provides the strongest cryptographic guarantees but demands sophisticated certificate management. Service meshes simplify operations while introducing infrastructure complexity. Token relay patterns excel at maintaining user context but require careful token lifecycle management.</p><p>The most successful implementations combine multiple patterns strategically: using service meshes for infrastructure security, token relay for user context, and selective mTLS for high-security communications. Start with simpler approaches and evolve toward more sophisticated patterns as your architecture and operational capabilities mature.</p><p>Remember that security is not a one-time implementation but an ongoing process. Regular security reviews, certificate rotation, policy updates, and incident response procedures are essential for maintaining secure service-to-service communication at scale.</p>]]></content:encoded></item><item><title><![CDATA[Passwordless Authentication: Implementation Strategies and User Experience ]]></title><description><![CDATA[Passwords are fundamentally broken.]]></description><link>https://blog.mustardtreegroup.com/p/passwordless-authentication-implementation</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/passwordless-authentication-implementation</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Mon, 04 Aug 2025 12:03:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!A2zK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!A2zK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!A2zK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg 424w, https://substackcdn.com/image/fetch/$s_!A2zK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg 848w, https://substackcdn.com/image/fetch/$s_!A2zK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!A2zK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!A2zK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1623553,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.lgger.com/i/169911308?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!A2zK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg 424w, https://substackcdn.com/image/fetch/$s_!A2zK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg 848w, https://substackcdn.com/image/fetch/$s_!A2zK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!A2zK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff0456b4d-456d-40d6-a38c-b6f9e2923cc4_5472x3078.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><em>Passwords are fundamentally broken. They&#8217;re weak, reused, stolen, and forgotten&#8202;&#8212;&#8202;yet they remain the backbone of authentication for most applications. The average user juggles over 100 password-protected accounts, leading to predictable behaviours: simple passwords, password reuse, and storage in insecure locations.</em></p><p>Passwordless authentication promises to solve these problems whilst improving user experience. But implementing passwordless systems requires careful consideration of security trade-offs, user experience design, and technical complexity. This guide explores three primary passwordless approaches: WebAuthn, magic links, and biometric authentication.</p><h3>The Password Problem: Why Change Matters</h3><p>Traditional password-based authentication faces several insurmountable challenges:</p><p><strong>Security vulnerabilities</strong> plague password systems. Data breaches expose billions of credentials annually, and users&#8217; tendency to reuse passwords amplifies the impact. Credential stuffing attacks succeed because users employ the same password across multiple services.</p><p><strong>Usability friction</strong> drives poor security practices. Complex password requirements lead users to append numbers or symbols to familiar passwords rather than creating truly random credentials. Password reset flows interrupt user journeys and create support overhead.</p><p><strong>Maintenance overhead</strong> burdens both users and organisations. Password policies require enforcement, storage demands secure hashing, and forgotten passwords generate support tickets.</p><h3>WebAuthn: The Standards-Based Approach</h3><p>Web Authentication (WebAuthn) represents the most robust passwordless solution, providing cryptographic security through public key authentication. Users register authenticators&#8202;&#8212;&#8202;hardware tokens, platform authenticators, or mobile devices&#8202;&#8212;&#8202;that generate cryptographic key pairs.</p><h3>WebAuthn Architecture</h3><p>WebAuthn operates through a challenge-response protocol between three entities:</p><ul><li><p><strong>Relying Party (RP)</strong>: Your web application</p></li><li><p><strong>Client</strong>: The user&#8217;s browser or mobile app</p></li><li><p><strong>Authenticator</strong>: Hardware token, phone, or built-in biometrics</p></li></ul><pre><code>// Registration flow
async function registerWebAuthn(username) {
    const publicKeyCredentialCreationOptions = {
        challenge: new Uint8Array(32), // Server-generated random bytes
        rp: {
            name: "Your App",
            id: "yourapp.co.uk",
        },
        user: {
            id: new TextEncoder().encode(username),
            name: username,
            displayName: username,
        },
        pubKeyCredParams: [{alg: -7, type: "public-key"}], // ES256
        authenticatorSelection: {
            authenticatorAttachment: "cross-platform", // Allow external authenticators
            userVerification: "preferred"
        },
        timeout: 60000,
        attestation: "direct"
    };</code></pre><pre><code>    const credential = await navigator.credentials.create({
        publicKey: publicKeyCredentialCreationOptions
    });
    
    // Send credential to server for verification and storage
    return await fetch('/webauthn/register', {
        method: 'POST',
        headers: { 'Content-Type': 'application/json' },
        body: JSON.stringify({
            id: credential.id,
            rawId: Array.from(new Uint8Array(credential.rawId)),
            response: {
                attestationObject: Array.from(new Uint8Array(credential.response.attestationObject)),
                clientDataJSON: Array.from(new Uint8Array(credential.response.clientDataJSON))
            }
        })
    });
}</code></pre><h3>Server-Side WebAuthn Implementation</h3><p>The server must validate registrations and authentication attempts whilst storing public keys securely:</p><pre><code>from webauthn import generate_registration_options, verify_registration_response
from webauthn.helpers import structs</code></pre><pre><code>class WebAuthnManager:
    def __init__(self, rp_id, rp_name, origin):
        self.rp_id = rp_id
        self.rp_name = rp_name  
        self.origin = origin
        
    def generate_registration_challenge(self, user_id, username):
        options = generate_registration_options(
            rp_id=self.rp_id,
            rp_name=self.rp_name,
            user_id=user_id.encode(),
            user_name=username,
            user_display_name=username
        )
        
        # Store challenge in session or database
        session['challenge'] = options.challenge
        return options
        
    def verify_registration(self, credential_data, expected_challenge):
        verification = verify_registration_response(
            credential=credential_data,
            expected_challenge=expected_challenge,
            expected_origin=self.origin,
            expected_rp_id=self.rp_id
        )
        
        if verification.verified:
            # Store credential public key and metadata
            self.store_credential(
                credential_id=verification.credential_id,
                public_key=verification.credential_public_key,
                sign_count=verification.sign_count
            )
            
        return verification.verified</code></pre><h3>WebAuthn User Experience Considerations</h3><p><strong>Progressive enhancement</strong> works best for WebAuthn adoption. Implement it as an optional enhancement rather than a replacement, allowing users to choose their preferred authentication method.</p><p><strong>Clear communication</strong> helps users understand the process. Terms like &#8220;passkey&#8221; or &#8220;security key&#8221; resonate better than technical jargon. Provide visual guidance for hardware token interactions and biometric prompts.</p><p><strong>Fallback mechanisms</strong> remain essential. Network issues, device incompatibility, or lost authenticators require alternative authentication paths.</p><h3>Magic Links: Simplicity with Trade-offs</h3><p>Magic links deliver passwordless authentication through email-based tokens. Users request access, receive a unique link via email, and clicking the link authenticates them. This approach eliminates passwords whilst leveraging existing email infrastructure.</p><h3>Magic Link Implementation</h3><pre><code>import secrets
import jwt
from datetime import datetime, timedelta</code></pre><pre><code>class MagicLinkManager:
    def __init__(self, secret_key, email_service):
        self.secret_key = secret_key
        self.email_service = email_service
        
    def generate_magic_link(self, email, redirect_url=None):
        # Generate cryptographically secure token
        token_data = {
            'email': email,
            'iat': datetime.utcnow(),
            'exp': datetime.utcnow() + timedelta(minutes=15),
            'purpose': 'authentication',
            'nonce': secrets.token_hex(16)  # Prevent token reuse
        }
        
        token = jwt.encode(token_data, self.secret_key, algorithm='HS256')
        magic_link = f"https://yourapp.co.uk/auth/verify?token={token}"
        
        if redirect_url:
            magic_link += f"&amp;redirect={redirect_url}"
            
        return magic_link
        
    def send_magic_link(self, email):
        if not self.is_valid_email(email):
            raise ValueError("Invalid email address")
            
        # Rate limiting to prevent abuse
        if self.is_rate_limited(email):
            raise RateLimitError("Too many requests")
            
        magic_link = self.generate_magic_link(email)
        
        self.email_service.send_email(
            to=email,
            subject="Sign in to Your App",
            template="magic_link",
            context={'magic_link': magic_link}
        )
        
    def verify_magic_link(self, token):
        try:
            payload = jwt.decode(token, self.secret_key, algorithms=['HS256'])
            
            # Check if token has been used (implement token blacklist)
            if self.is_token_used(payload['nonce']):
                raise ValueError("Token already used")
                
            # Mark token as used
            self.mark_token_used(payload['nonce'])
            
            return payload['email']
            
        except jwt.ExpiredSignatureError:
            raise ValueError("Token expired")
        except jwt.InvalidTokenError:
            raise ValueError("Invalid token")</code></pre><h3>Magic Link Security Considerations</h3><p><strong>Email security</strong> becomes critical in magic link systems. Email interception, forwarding rules, and shared inboxes can compromise authentication. Consider implementing additional verification for sensitive operations.</p><p><strong>Token lifecycle management</strong> prevents replay attacks. Single-use tokens with short expiration windows (5&#8211;15 minutes) limit exposure. Implement token revocation for active sessions when new magic links are requested.</p><p><strong>Rate limiting</strong> prevents abuse whilst maintaining usability. Allow 3&#8211;5 requests per hour per email address, with exponential backoff for repeated requests.</p><h3>Biometric Authentication: Platform Integration</h3><p>Biometric authentication leverages device capabilities&#8202;&#8212;&#8202;fingerprints, face recognition, or voice patterns&#8202;&#8212;&#8202;for user verification. This approach provides excellent user experience on supported devices whilst maintaining strong security.</p><h3>Platform-Specific Implementation</h3><pre><code>// iOS/Safari Touch ID/Face ID integration
async function authenticateWithBiometrics() {
    if (!window.PublicKeyCredential) {
        throw new Error('WebAuthn not supported');
    }
    
    // Check for platform authenticator
    const available = await PublicKeyCredential.isUserVerifyingPlatformAuthenticatorAvailable();
    if (!available) {
        throw new Error('Biometric authentication not available');
    }
    
    const publicKeyCredentialRequestOptions = {
        challenge: new Uint8Array(32),
        allowCredentials: [{
            id: stored_credential_id,
            type: 'public-key',
            transports: ['internal']
        }],
        userVerification: 'required',
        timeout: 30000
    };
    
    const assertion = await navigator.credentials.get({
        publicKey: publicKeyCredentialRequestOptions
    });
    
    return assertion;
}</code></pre><pre><code>// Android biometric prompt integration
function initAndroidBiometrics() {
    if ('credentials' in navigator) {
        // Use WebAuthn with platform authenticator
        return authenticateWithBiometrics();
    } else if (window.Android &amp;&amp; window.Android.showBiometricPrompt) {
        // Fallback to native Android integration
        return new Promise((resolve, reject) =&gt; {
            window.Android.showBiometricPrompt(
                'Authenticate to continue',
                resolve,
                reject
            );
        });
    }
    
    throw new Error('Biometric authentication not available');
}</code></pre><h3>Biometric UX Best Practices</h3><p><strong>Graceful degradation</strong> handles device limitations. Not all devices support biometrics, and users may disable these features for privacy reasons. Provide alternative authentication methods without friction.</p><p><strong>Clear privacy communication</strong> addresses user concerns about biometric data. Emphasise that biometric templates remain on-device and aren&#8217;t transmitted to servers. Local processing and cryptographic signatures maintain privacy.</p><p><strong>Accessibility considerations</strong> ensure inclusive design. Some users cannot use certain biometric modalities due to physical limitations. Multiple biometric options and alternative authentication methods maintain accessibility.</p><h3>Implementation Strategy: Progressive Rollout</h3><h3>Phase 1: Foundation</h3><p>Start with magic links as the simplest passwordless option. This requires minimal client-side complexity whilst providing immediate user experience improvements. Implement robust email security and rate limiting.</p><h3>Phase 2: Enhanced Security</h3><p>Add WebAuthn support for security-conscious users. Begin with optional enrollment, allowing users to register security keys or platform authenticators alongside existing authentication methods.</p><h3>Phase 3: Biometric Integration</h3><p>Integrate platform-specific biometric authentication where available. Focus on mobile applications first, as mobile biometric adoption exceeds desktop usage.</p><h3>Security Considerations Across Methods</h3><p><strong>Account recovery</strong> becomes more complex in passwordless systems. Users may lose devices, change email addresses, or disable biometrics. Implement secure account recovery flows that balance security with usability.</p><p><strong>Session management</strong> requires careful consideration. Passwordless authentication often provides stronger initial authentication, but session security remains important. Implement appropriate session timeouts and reauthentication for sensitive operations.</p><p><strong>Monitoring and anomaly detection</strong> help identify potential security issues. Track authentication patterns, device changes, and geographic anomalies. Unusual authentication attempts may indicate compromise.</p><h3>User Experience Design Principles</h3><p><strong>Contextual prompts</strong> improve adoption rates. Introduce passwordless options after users experience password friction&#8202;&#8212;&#8202;failed login attempts or password reset flows create natural opportunities.</p><p><strong>Clear value proposition</strong> helps users understand benefits. Emphasise convenience, security, and time savings rather than technical implementation details.</p><p><strong>Seamless fallbacks</strong> maintain user trust. When passwordless methods fail, provide clear paths to alternative authentication without abandoning the user journey.</p><h3>Measuring Success</h3><p>Track key metrics to evaluate passwordless implementation effectiveness:</p><ul><li><p><strong>Authentication success rates</strong>: Compare completion rates across methods</p></li><li><p><strong>Time to authenticate</strong>: Measure user journey duration</p></li><li><p><strong>Support ticket volume</strong>: Monitor authentication-related support requests</p></li><li><p><strong>User adoption</strong>: Track voluntary enrollment in passwordless methods</p></li><li><p><strong>Security incidents</strong>: Monitor authentication-related security events</p></li></ul><h3>Looking Forward</h3><p>Passwordless authentication adoption continues accelerating. Apple&#8217;s Passkeys initiative, Google&#8217;s WebAuthn implementation, and Microsoft&#8217;s Windows Hello drive consumer familiarity. Enterprise adoption follows consumer trends, making now an ideal time to implement passwordless systems.</p><p>The future points towards seamless, contextual authentication that adapts to user behaviour and risk profiles. Combining multiple passwordless methods with adaptive risk assessment creates robust, user-friendly authentication systems.</p><p>The transition to passwordless authentication isn&#8217;t just a technical upgrade&#8202;&#8212;&#8202;it&#8217;s a fundamental improvement in how users interact with digital systems. By eliminating passwords, we remove a significant source of security vulnerabilities whilst creating more intuitive, accessible authentication experiences.</p>]]></content:encoded></item><item><title><![CDATA[Navigating the New Identity Fabric—Governance, AI, and the Future of Access Management]]></title><description><![CDATA[The transformation of Identity and Access Management (IAM) from a simple authentication mechanism to the central nervous system of modern security represents one of the most profound shifts in cybersecurity history.]]></description><link>https://blog.mustardtreegroup.com/p/navigating-the-new-identity-fabricgovernance</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/navigating-the-new-identity-fabricgovernance</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Tue, 24 Jun 2025 11:42:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ISCy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ISCy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ISCy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ISCy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ISCy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ISCy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ISCy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg" width="1456" height="820" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:820,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2137805,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.lgger.com/i/166708356?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ISCy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ISCy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ISCy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ISCy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fddc1b8c0-c8de-4cb7-8fcf-98ba2b170f61_5184x2920.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by Dan Nelson: https://www.pexels.com/photo/person-holding-a-tablet-3949101/</figcaption></figure></div><p>The transformation of Identity and Access Management (IAM) from a simple authentication mechanism to the central nervous system of modern security represents one of the most profound shifts in cybersecurity history. As organizations grapple with dissolved network perimeters, exponential growth in machine identities, and the double-edged sword of artificial intelligence, IAM has evolved beyond its traditional boundaries to become inseparable from governance, risk management, and business strategy itself.</p><p>This convergence is not merely technological&#8212;it reflects a fundamental reimagining of trust in the digital age. Where once we trusted locations and networks, we now must verify every identity, every transaction, and every moment. The emergence of AI systems that can make thousands of decisions per second while exhibiting unpredictable behaviors challenges our very conception of access control. Meanwhile, regulatory frameworks struggle to keep pace, creating a complex landscape where security leaders must balance innovation with compliance, automation with control, and accessibility with zero trust principles.</p><p>The stakes could not be higher. Identity-related breaches now account for 79% of security incidents, while non-human identities outnumber human ones by ratios exceeding 40:1. Organizations that master this new identity fabric will thrive in the AI-accelerated economy; those that fail to adapt face not just security breaches but existential threats to their ability to operate in an increasingly regulated, automated world.</p><h2>The Dissolution of the Perimeter and the Ascent of Identity</h2><p>The death of the network perimeter wasn't sudden&#8212;it was a gradual dissolution that accelerated into an avalanche. Traditional security operated like a medieval castle, with thick walls separating the trusted interior from the hostile outside world. This model worked when organizations controlled their infrastructure, applications lived in data centers, and employees worked from offices. But the digital transformation shattered these assumptions so thoroughly that the entire foundation of enterprise security had to be reconsidered.</p><p>Cloud adoption served as the primary catalyst, with 94% of enterprises now operating in multi-cloud environments where data and applications exist far beyond any controllable perimeter. The pandemic-driven shift to remote work merely accelerated what was already inevitable: the complete untethering of productivity from location. When employees access corporate resources from coffee shops, contractors connect from different continents, and applications communicate across multiple cloud providers, the very concept of an "inside" and "outside" becomes meaningless. In this new reality, identity emerges not as a replacement for the perimeter but as the only consistent element in an otherwise fluid architecture.</p><p>This transformation required new technological foundations. The evolution from LDAP's centralized directories through SAML's federated authentication to OAuth and OpenID Connect's API-driven world tells the story of increasing complexity and sophistication. Each standard addressed the limitations of its predecessors while enabling new possibilities. Modern cloud-native IAM platforms have capitalized on these standards to deliver remarkable improvements: organizations report 67.4% fewer identity-related incidents and 41.8% lower operational overhead after migration. But perhaps most tellingly, the time to onboard new applications has dropped from nearly a month to less than a week, demonstrating that proper identity architecture accelerates rather than impedes business velocity.</p><h2>The Convergence of IAM and GRC</h2><p>The integration of Identity and Access Management with Governance, Risk, and Compliance represents a maturation of organizational thinking about security. No longer can these disciplines operate in silos&#8212;they have become so intertwined that attempting to separate them creates dangerous gaps and inefficiencies. This convergence reflects a deeper truth: in a world where identity is the primary security control, managing identities IS governance, and governing access IS risk management.</p><p>Modern IAM platforms have evolved to encompass both operational access management&#8212;the real-time authentication, authorization, and session management that enables daily work&#8212;and strategic identity governance&#8212;the policy definition, access certification, and compliance reporting that ensures appropriate oversight. This dual nature transforms IAM from a technical utility into a business-critical platform that directly supports regulatory compliance, risk reduction, and operational efficiency. The shift from periodic access reviews to continuous compliance monitoring exemplifies this evolution, as organizations can now detect and remediate inappropriate access in real-time rather than discovering problems months later during audits.</p><p>The regulatory landscape has become increasingly prescriptive about identity and access controls. The SEC's cybersecurity disclosure rule requires public companies to report material incidents within four business days, making rapid detection and response essential. The EU AI Act introduces entirely new categories of compliance requirements for organizations deploying AI systems, with potential fines reaching 7% of global revenue. GDPR, CCPA, HIPAA, SOX, and PCI-DSS each bring specific mandates around access control, audit trails, and data governance. Policy-as-code has emerged as the only scalable approach to managing this complexity, enabling organizations to codify compliance requirements directly into their IAM systems and automatically generate evidence for auditors.</p><h2>Zero Trust Architecture Implementation</h2><p>Zero Trust represents a philosophical revolution in security thinking, rejecting the fundamental assumption that anything should be trusted by default. The principle of "never trust, always verify" sounds simple but implementing it requires a complete reimagining of enterprise architecture. Every user, device, application, and network flow must be treated as potentially hostile until proven otherwise&#8212;not just once at login, but continuously throughout every session.</p><p>The three pillars of Zero Trust work synergistically to create defense in depth. Explicit verification goes beyond simple authentication to evaluate multiple contextual factors: who is requesting access, from what device, at what location, exhibiting what behavior patterns, to access what resource, for what stated purpose? This multidimensional analysis enables nuanced decisions that balance security with usability. Least privilege access ensures that even verified entities receive only the minimum permissions required for their immediate task, while temporal controls ensure these permissions expire automatically. The assumption of breach drives architectural decisions toward resilience: when attackers inevitably gain some level of access, microsegmentation and encryption limit their ability to move laterally or exfiltrate data.</p><p>The NIST Zero Trust Architecture provides a conceptual framework rather than a prescriptive implementation, recognizing that each organization's journey will be unique. The Policy Engine serves as the brain, continuously evaluating requests against policies and real-time threat intelligence. The Policy Administrator acts as the nervous system, communicating decisions throughout the infrastructure. Policy Enforcement Points serve as the muscles, actually granting or denying access at each resource. But the real challenge lies not in deploying these components but in feeding them the continuous stream of contextual data required for intelligent decisions. Success requires breaking down silos between identity, network, endpoint, and application security to create a unified fabric of observable, controllable, and auditable access decisions.</p><h2>Enterprise vs SME Strategies</h2><p>The divergent paths of large enterprises and small-to-medium businesses in IAM implementation reflect not just differences in resources but fundamental differences in complexity, risk tolerance, and operational requirements. Understanding these differences is crucial for vendors, consultants, and security leaders who must navigate both worlds.</p><p>Large enterprises face staggering complexity: hundreds of thousands of identities spread across legacy systems, cloud platforms, and SaaS applications, often complicated by mergers and acquisitions that create identity silos. Their regulatory obligations span multiple jurisdictions and frameworks, requiring sophisticated governance capabilities. These organizations typically invest in comprehensive Identity Governance and Administration (IGA) platforms from vendors like SailPoint, Saviynt, or Oracle, which provide the deep functionality required for role mining, separation of duties enforcement, and complex approval workflows. The focus is on centralized governance with federated execution&#8212;maintaining consistent policies while allowing business units flexibility in implementation.</p><p>Small and medium enterprises operate under different constraints but face many of the same risks. With limited budgets and IT staff who wear multiple hats, SMEs cannot afford the complexity and overhead of enterprise IGA platforms. Cloud-native Identity-as-a-Service (IDaaS) solutions from vendors like Okta, JumpCloud, or OneLogin provide these organizations with enterprise-grade capabilities in a consumable package. The emphasis shifts from customization to standardization, from on-premises control to cloud-based simplicity. Yet this creates a dangerous governance gap: as SMEs adopt sophisticated technologies like multi-cloud infrastructure and AI tools, they face enterprise-level identity risks without enterprise-grade governance capabilities. The market desperately needs a new category of "IGA-lite" solutions that provide automated, AI-driven governance without the cost and complexity of traditional platforms.</p><h2>The Non-Human Identity Crisis</h2><p>The explosion of non-human identities represents perhaps the most underappreciated security challenge facing modern organizations. While security teams have spent decades refining controls for human users, the proliferation of service accounts, API keys, OAuth tokens, and AI agents has created a vast, largely ungoverned attack surface. These machine identities now outnumber human identities by ratios of 40:1 or higher, and unlike human identities that remain relatively stable, machine identities multiply exponentially with every new microservice, automation workflow, or AI deployment.</p><p>The risks are not theoretical. The 2023 discovery of 12.8 million exposed secrets on GitHub alone demonstrates the scale of the problem. Non-human identities suffer from unique vulnerabilities: they're often created ad-hoc by developers seeking to solve immediate problems, lack clear ownership or lifecycle management, rely on static credentials that may be hardcoded in source code, and receive excessive permissions to avoid potential disruptions. Traditional security controls like multi-factor authentication and behavioral analytics, designed for human users, simply don't apply to entities that never sleep, never change their behavior, and can operate from multiple locations simultaneously.</p><p>Securing this explosion requires a fundamental shift in thinking. Organizations must treat non-human identities as first-class citizens in their IAM programs, subject to the same governance, monitoring, and lifecycle management as human users. This means implementing continuous discovery to find shadow service accounts, assigning clear ownership with accountability for each identity's existence and permissions, enforcing least privilege with the same rigor applied to human users, automating the entire lifecycle from provisioning to deprovisioning, modernizing credential management with dynamic secrets and automated rotation, and integrating machine identity governance into central IAM platforms rather than treating it as a separate problem. The organizations that master non-human identity governance will have a significant security advantage; those that ignore it face inevitable compromise.</p><h2>The AI Paradox</h2><p>Artificial Intelligence presents the ultimate paradox for security teams: it is simultaneously the most powerful tool for enhancing security and the most challenging threat to traditional security models. This duality creates a complex landscape where security leaders must harness AI's capabilities while defending against its risks, often within the same systems and sometimes within the same transactions.</p><p>On the positive side, AI transforms security operations from reactive to predictive. Machine learning models can analyze vast datasets to identify subtle anomalies that would escape human analysts, enabling detection of zero-day attacks and insider threats. Behavioral analytics continuously evaluate user actions against established baselines, triggering adaptive authentication when anomalies arise. Security Orchestration, Automation, and Response (SOAR) platforms use AI to coordinate responses across multiple tools, reducing response times from hours to seconds. AI even enhances governance through automated role mining and access optimization, helping organizations achieve least privilege at scale.</p><p>Yet AI simultaneously undermines traditional security assumptions. Data poisoning attacks can corrupt training datasets, causing models to make incorrect decisions that attackers can later exploit. Adversarial inputs can trick production models into misclassifications, potentially granting unauthorized access. The vast data requirements of AI systems pressure organizations to break down silos and grant broad access, directly conflicting with least privilege principles. The black-box nature of many AI models makes it impossible to audit or explain their decisions, complicating compliance and forensics. Most fundamentally, AI shifts security from deterministic to probabilistic models: instead of binary allow/deny decisions based on clear rules, we now have risk scores and confidence intervals that must be interpreted and acted upon. This recursive challenge&#8212;using AI to govern AI while ensuring the governance AI itself remains trustworthy&#8212;represents one of the most complex problems in modern security.</p><h2>Reconciling AI with Zero Trust</h2><p>The collision between AI's operational requirements and Zero Trust's security principles creates friction that threatens to derail digital transformation initiatives. AI systems need broad data access to learn effectively, but Zero Trust demands minimal privileges. Automation requires speed, but Just-in-Time access introduces friction. AI behavior is often non-deterministic and unpredictable, but Zero Trust requires explicit verification of known patterns. Resolving these conflicts requires evolving our security models to accommodate a new class of intelligent, autonomous entities that don't fit traditional identity categories.</p><p>The path forward requires adaptive, context-aware governance that can distinguish between different types of AI activities. A machine learning model training on anonymized historical data presents different risks than a production AI agent accessing live customer information. Policies must become dynamic, adjusting based on the AI system's purpose, behavior patterns, and risk profile. This necessitates using AI to govern AI&#8212;deploying machine learning within Policy Engines to evaluate and respond to requests from other AI systems at machine speed. It's an arms race of sorts, but one where both sides work for the same organization.</p><p>Technical solutions include provisioning AI agents with strong cryptographic identities through frameworks like SPIFFE, enabling verification without relying on static credentials. Data-centric security controls become paramount, with classification, encryption, and loss prevention applied at the data level rather than just at access points. The future points toward multi-modal Zero Trust architectures with distinct policy sets for different identity classes: traditional rules for human users, streamlined policies for simple service accounts, and adaptive, AI-driven policies for autonomous agents. This isn't just an evolution of Zero Trust&#8212;it's a fundamental reimagining of how we establish and maintain trust in an era of machine intelligence.</p><h2>Strategic Recommendations</h2><p>Building a resilient IAM program for the AI era requires both immediate tactical actions and long-term strategic transformation. Organizations must move beyond viewing these as technical projects to recognize them as fundamental business enablers that determine competitive advantage in an increasingly automated economy.</p><p>In the immediate term, organizations must gain visibility into their complete identity landscape. This means discovering not just user accounts but every service account, API key, and automated process that has access to resources. Implementing phishing-resistant multi-factor authentication for all privileged accounts is no longer optional&#8212;it's the minimum bar for credibility. Audit logs must be immutable and tamper-evident, capable of supporting both security investigations and regulatory inquiries. Most urgently, organizations need AI-specific access controls that recognize the unique requirements and risks of these systems.</p><p>The medium-term focus shifts to eliminating standing privileges through Just-in-Time access controls, particularly for administrative accounts where the risk is highest. Policy-as-code initiatives should codify compliance requirements directly into IAM systems, enabling automatic enforcement and evidence generation. Organizations must deploy AI governance frameworks that can manage the lifecycle of AI systems from development through decommissioning, including specialized gateways that can inspect and control AI behavior. This period also demands serious investment in DevSecOps practices that embed security into development workflows, making the secure path the easiest path for developers.</p><p>Long-term transformation aims to create a unified identity fabric spanning all environments&#8212;cloud, on-premises, SaaS, and edge. Access decisions must become truly risk-adaptive, continuously adjusting based on real-time signals rather than static rules. Organizations should align their AI deployments with emerging frameworks like ISO 42001 or the NIST AI Risk Management Framework, not just for compliance but as a competitive differentiator. The ultimate goal is a multi-modal Zero Trust architecture sophisticated enough to handle the full spectrum of identities from humans to simple services to autonomous AI agents, each with appropriate governance models.</p><h2>Forward View</h2><p>The journey from network perimeters to identity fabrics, from static access controls to adaptive Zero Trust, from human-centric IAM to AI-inclusive governance, represents more than technological evolution&#8212;it's a fundamental reimagining of digital trust. Organizations standing at this crossroads face choices that will determine their security posture, regulatory compliance, and competitive position for years to come.</p><p>Success requires more than deploying new technologies or updating policies. It demands a cultural transformation that breaks down silos between security, development, and business teams. It requires investment in new skills that bridge traditional security expertise with AI and automation knowledge. Most critically, it needs leadership that understands identity not as a technical detail but as the foundation upon which all digital business rests.</p><p>The organizations that master this complexity&#8212;that build adaptive, intelligent identity fabrics capable of governing humans and machines alike&#8212;will thrive in an AI-accelerated future. They will move faster while remaining secure, innovate freely while maintaining compliance, and harness automation while preserving control. Those that fail to evolve, that cling to outdated perimeter-based thinking or treat AI as just another user type, face not just increased breach risk but fundamental inability to compete in an automated economy.</p><p> </p>]]></content:encoded></item><item><title><![CDATA[Snapshot Briefings: The Implications of Trump's visit to the Middle East.]]></title><link>https://blog.mustardtreegroup.com/p/snapshot-briefings-the-implications</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/snapshot-briefings-the-implications</guid><pubDate>Sat, 17 May 2025 17:07:31 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/163789224/bdeb3168003517bc09c968112f6f1220.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p></p>]]></content:encoded></item><item><title><![CDATA[European Vulnerability Database (EUVD) Launch: Strategic Briefing]]></title><description><![CDATA[The European Union Agency for Cybersecurity (ENISA) has officially launched the European Vulnerability Database (EUVD), representing a significant shift in the global vulnerability management landscape.]]></description><link>https://blog.mustardtreegroup.com/p/european-vulnerability-database-euvd</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/european-vulnerability-database-euvd</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Sat, 17 May 2025 14:03:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mUyM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mUyM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mUyM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mUyM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mUyM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mUyM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mUyM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg" width="1456" height="852" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:852,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2200465,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://sodekunle.substack.com/i/163699934?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mUyM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mUyM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mUyM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mUyM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa48c3492-2b6c-405d-b4dc-5df336409389_5504x3220.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The European Union Agency for Cybersecurity (ENISA) has officially launched the European Vulnerability Database (EUVD), representing a significant shift in the global vulnerability management landscape. This system offers both strategic opportunities and implementation challenges for organisations. <strong>Key takeaway:</strong> Don't view it as "yet another system to monitor" but as a strategic redundancy that strengthens your security posture while aligning with EU regulatory requirements.</p><div><hr></div><h2>Why This Matters Now</h2><p>On 13 May 2025, ENISA officially launched the European Vulnerability Database (EUVD), a significant development in the EU's cybersecurity infrastructure. This system, mandated by the NIS2 Directive, represents Europe's move toward greater technological sovereignty in vulnerability management whilst maintaining coordination with existing global systems.</p><p>The timing couldn't be more critical. Just last month, the U.S. government nearly discontinued funding for MITRE's Common Vulnerabilities and Exposures (CVE) programme&#8212;a cornerstone of global vulnerability tracking for 25 years&#8212;before CISA intervened with last-minute emergency funding for 11 months. This near-miss exposed a dangerous dependency on single-nation infrastructure for critical cybersecurity functions.</p><p>ENISA began developing the EUVD in June 2024 and has been operating a limited-access beta version since early 2025. The system is now fully operational and publicly accessible.</p><h2>What Technical Leaders Need to Know</h2><h3>The Architecture: More Than Just Another Database</h3><p>The EUVD isn't merely duplicating existing systems but offers enhanced functionality through:</p><ul><li><p><strong>Specialised dashboard views</strong> for critical vulnerabilities, actively exploited vulnerabilities, and EU-coordinated vulnerabilities</p></li><li><p><strong>Multi-source intelligence aggregation</strong> from open-source databases, national CSIRTs, vendor advisories, and exploitation data</p></li><li><p><strong>Near real-time updates</strong> rather than the delayed processing that has plagued other vulnerability databases</p></li><li><p><strong>Machine-readable security advisories</strong> through Common Security Advisory Framework (CSAF) support</p></li></ul><h3>Identification and Interoperability: Playing Nice with Others</h3><p>The EUVD employs its own identification format (EUVD-year-designation) whilst maintaining interoperability with existing systems through:</p><ul><li><p>Cross-referencing with CVE IDs</p></li><li><p>Supporting multiple vulnerability tracking systems</p></li><li><p>Integration with open-source correlation tools</p></li><li><p>Compatibility with global security standards</p></li></ul><p>This hybrid approach demonstrates the EU's commitment to both sovereignty and collaboration&#8212;creating independence without isolation.</p><h2>Strategic Implications for Your Organisation</h2><h3>1. Sovereignty and Resilience</h3><p>The EUVD represents a strategic move toward European digital sovereignty. By establishing a complementary vulnerability tracking system, the EU reduces dependency on U.S.-controlled infrastructure whilst maintaining compatibility with global standards.</p><p>For multinational organisations, this signals a need to develop regionally-aware security strategies that acknowledge the growing diversification of cybersecurity infrastructure.</p><h3>2. Operational Redundancy</h3><p>The near-collapse of CVE funding demonstrated the risk of single-point failures in critical cybersecurity infrastructure. The EUVD provides valuable redundancy, ensuring continuity even if disruptions occur elsewhere.</p><p>This is particularly significant for organisations operating in regulated EU sectors where continuous vulnerability awareness is not just good practice but a compliance requirement.</p><h3>3. Regulatory Alignment</h3><p>The EUVD is directly connected to the EU's regulatory framework, specifically the NIS2 Directive and the Cyber Resilience Act (CRA). Organisations operating in EU jurisdictions should view EUVD integration as a component of regulatory compliance strategy, particularly those in critical infrastructure sectors.</p><h2>Strengths vs Challenges: A Balanced Assessment</h2><h3>What Works Well</h3><ul><li><p><strong>Real-time updates:</strong> Unlike the U.S. National Vulnerability Database (NVD), which has experienced submission backlogs, the EUVD aims to provide near real-time updates</p></li><li><p><strong>Enhanced visualisation:</strong> Prioritisation of critical and exploited vulnerabilities with improved interfaces</p></li><li><p><strong>EU-specific focus:</strong> Special attention to vulnerabilities affecting European critical infrastructure</p></li><li><p><strong>Multinational sponsorship:</strong> Reduced political volatility compared to single-nation funded alternatives</p></li></ul><h3>Implementation Hurdles</h3><ul><li><p><strong>Maturity:</strong> As a new system, the EUVD will require time to reach full operational effectiveness</p></li><li><p><strong>Integration complexity:</strong> Organisations will need to incorporate another vulnerability tracking system into existing security operations</p></li><li><p><strong>Potential divergence:</strong> Despite commitment to interoperability, regional differences in vulnerability classification could emerge over time</p></li></ul><h2>Implementation Roadmap: From Strategy to Action</h2><h3>First 90 Days</h3><ol><li><p><strong>Establish EUVD monitoring:</strong> Configure vulnerability management platforms to incorporate EUVD data feeds alongside existing CVE monitoring</p></li><li><p><strong>Update security policies:</strong> Revise vulnerability management documentation to reference EUVD identifiers</p></li><li><p><strong>Vendor assessment:</strong> Evaluate how security vendors and partners plan to integrate EUVD into their workflows</p></li></ol><h3>Medium-term Strategy (3-12 months)</h3><ol><li><p><strong>Automation integration:</strong> Develop workflows that incorporate EUVD data for vulnerability prioritisation, particularly for EU-based assets</p></li><li><p><strong>Training and awareness:</strong> Educate security teams on EUVD's structure and capabilities</p></li><li><p><strong>Feedback participation:</strong> Contribute to ENISA's EUVD feedback programme to shape the platform's development</p></li></ol><h3>Long-term Positioning (12+ months)</h3><ol><li><p><strong>Regional risk assessment:</strong> Develop region-specific vulnerability management approaches</p></li><li><p><strong>Regulatory alignment:</strong> Position vulnerability management practices within the broader context of evolving EU cybersecurity regulations</p></li><li><p><strong>Resilience planning:</strong> Design processes that remain effective regardless of potential disruptions to any single vulnerability tracking system</p></li></ol><h3><strong>How EUVD Compares to Existing Systems</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cfTV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9554453c-1c21-480a-be0c-252b600c582f_692x336.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cfTV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9554453c-1c21-480a-be0c-252b600c582f_692x336.png 424w, https://substackcdn.com/image/fetch/$s_!cfTV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9554453c-1c21-480a-be0c-252b600c582f_692x336.png 848w, https://substackcdn.com/image/fetch/$s_!cfTV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9554453c-1c21-480a-be0c-252b600c582f_692x336.png 1272w, https://substackcdn.com/image/fetch/$s_!cfTV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9554453c-1c21-480a-be0c-252b600c582f_692x336.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cfTV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9554453c-1c21-480a-be0c-252b600c582f_692x336.png" width="692" height="336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9554453c-1c21-480a-be0c-252b600c582f_692x336.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:336,&quot;width&quot;:692,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:39477,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://sodekunle.substack.com/i/163699934?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9554453c-1c21-480a-be0c-252b600c582f_692x336.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cfTV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9554453c-1c21-480a-be0c-252b600c582f_692x336.png 424w, https://substackcdn.com/image/fetch/$s_!cfTV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9554453c-1c21-480a-be0c-252b600c582f_692x336.png 848w, https://substackcdn.com/image/fetch/$s_!cfTV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9554453c-1c21-480a-be0c-252b600c582f_692x336.png 1272w, https://substackcdn.com/image/fetch/$s_!cfTV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9554453c-1c21-480a-be0c-252b600c582f_692x336.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Balanced Approach Forward</h2><p>The European Vulnerability Database represents both a strategic opportunity and an operational challenge. While adding complexity to vulnerability management processes, it provides valuable redundancy and potentially enhanced visibility into critical vulnerabilities, particularly those affecting European assets.</p><p>The most prudent approach is neither over-reliance on EUVD nor dismissal of its significance, but rather thoughtful integration into existing security operations. Organisations should position themselves to benefit from multiple, complementary sources of vulnerability intelligence while maintaining efficiency in remediation workflows.</p><p>ENISA has explicitly stated that 2025 will be dedicated to further improving the EUVD based on stakeholder feedback. Technical decision makers should actively participate in this process to ensure the system evolves to meet organisational needs.</p>]]></content:encoded></item><item><title><![CDATA[The Evolution of Cybersecurity: Beyond Point-in-Time Testing and Toward Comprehensive Defence]]></title><description><![CDATA[As the complexity and frequency of cyber attacks continue to escalate, traditional security methodologies such as point-in-time penetration testing are increasingly insufficient to address modern threats.]]></description><link>https://blog.mustardtreegroup.com/p/the-evolution-of-cybersecurity-beyond</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/the-evolution-of-cybersecurity-beyond</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Fri, 16 May 2025 10:49:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!NrMf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NrMf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NrMf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NrMf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NrMf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NrMf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NrMf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:785106,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://sodekunle.substack.com/i/163699341?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NrMf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg 424w, https://substackcdn.com/image/fetch/$s_!NrMf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg 848w, https://substackcdn.com/image/fetch/$s_!NrMf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!NrMf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c31207-d2f9-4e6f-a2ee-477c4155bf6f_5184x3456.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@jefflssantos?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">Jefferson Santos</a> on <a href="https://unsplash.com/photos/person-using-laptop-computers-9SoCnyQmkzI?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">Unsplash</a></figcaption></figure></div><p>As the complexity and frequency of cyber attacks continue to escalate, traditional security methodologies such as point-in-time penetration testing are increasingly insufficient to address modern threats. The recent breaches at major UK retailers Harrods, Marks &amp; Spencer, and Co-op illustrate that even organizations with substantial security investments remain vulnerable to sophisticated attacks. This article examines whether point-in-time security testing has become obsolete, evaluates the critical role of human-centric security ("the human firewall"), and assesses if we are approaching a paradigm shift in cybersecurity&#8212;possibly precipitated by a catastrophic "big one" event that would fundamentally alter security culture.</p><h2>The Limitations of Point-in-Time Penetration Testing</h2><p>Traditional penetration testing provides a valuable but inherently limited snapshot of an organization's security posture. As cyber threats evolve at unprecedented speeds, the fundamental limitations of this approach have become increasingly apparent:</p><h3>Static Assessment in a Dynamic Threat Landscape</h3><p>Point-in-time penetration testing represents a moment-in-time assessment of security vulnerabilities, but the cyber threat landscape is continuously evolving. As organizations build and improve their security postures, they often continue to rely on these periodic assessments despite their limitations. Security vulnerabilities can emerge at any moment between scheduled tests, leaving critical systems exposed for months until the next assessment cycle.</p><p>According to Security Scorecard, "Point-in-time IT security risk assessments can find vulnerabilities at a single moment, but they fail to monitor activity between the assessments. These assessments quickly go out of date and depending on the form, can be very subjective." Organizations often engage in "security theatre" before scheduled assessments, temporarily strengthening systems to meet compliance requirements rather than maintaining consistent security postures.</p><h3>Delayed Response to Emerging Threats</h3><p>The gap between traditional penetration test schedules creates dangerous windows of vulnerability. SynerComm highlights that "without continuous testing, your security posture can quickly become outdated, leaving your systems exposed to the latest attack vectors." This delay in identifying and addressing vulnerabilities provides ample opportunity for threat actors to exploit weaknesses.</p><p>The recent attacks on UK retailers underscore this risk. In April and May 2025, Marks &amp; Spencer, Co-op, and Harrods all suffered significant cyber attacks within a short timeframe. M&amp;S was particularly affected, with its online services disrupted for weeks and customer data compromised. According to Reuters, the company lost approximately &#163;3.5 million in daily revenue and saw around &#163;700 million wiped from its market value.</p><h3>Incomplete Coverage</h3><p>Traditional penetration testing typically focuses on specific systems or applications, potentially overlooking vulnerabilities in other parts of the organization's infrastructure. This siloed approach creates blind spots that sophisticated attackers can exploit, particularly in complex, interconnected environments.</p><p>The cyber attacks on M&amp;S, Harrods, and Co-op demonstrate the complexity of modern threats. These attacks have been linked to a group called Scattered Spider (also known as Octo Tempest), which reportedly used the DragonForce ransomware on M&amp;S's VMware ESXi hosts to encrypt virtual machines. Their methods included sophisticated social engineering techniques to convince IT help desks to reset passwords, highlighting how attackers exploit both technical vulnerabilities and human factors.</p><h2>The Rise of Continuous Security Testing</h2><p>As limitations of traditional penetration testing become more apparent, organizations are shifting toward continuous security approaches:</p><h3>Continuous Penetration Testing</h3><p>Continuous penetration testing represents an evolution of traditional methods, involving frequent and iterative testing to identify vulnerabilities as they emerge. According to Evolve Security, this approach "allows security teams to catch vulnerabilities as they arise and effectively seal gaps before they are exploited." By combining automated tools with regular human expertise, continuous testing provides ongoing visibility into an organization's security posture.</p><h3>Benefits of Continuous Monitoring</h3><p>A continuous approach offers significant advantages:</p><ol><li><p><strong>Real-time threat detection</strong>: Continuous monitoring enables organizations to identify and respond to emerging threats immediately, dramatically reducing the window of exposure.</p></li><li><p><strong>Adaptation to evolving threats</strong>: Regular testing allows security teams to adjust their strategies based on the latest attack vectors and techniques.</p></li><li><p><strong>Comprehensive coverage</strong>: Continuous approaches can cover a broader range of systems and applications, reducing blind spots.</p></li><li><p><strong>Integration with development cycles</strong>: Continuous security testing aligns with modern DevOps practices, enabling security to be integrated into the development process.</p></li></ol><p>The MITRE ATT&amp;CK framework has become an invaluable resource for implementing comprehensive security strategies. As described by MITRE, it's "a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations." By mapping attacks using this framework, organizations can better understand threat actors' behaviours and implement appropriate countermeasures.</p><h2>The Human Firewall: The Critical Element in Modern Cybersecurity</h2><p>While technological solutions are essential, the human element remains both the greatest vulnerability and potential strength in cybersecurity defences.</p><h3>The Human Factor in Cybersecurity Breaches</h3><p>Human error continues to be a primary factor in security breaches. According to current statistics:</p><ul><li><p>82% of data breaches have been linked to human-related security weaknesses</p></li><li><p>The human element is the common root cause of 68% of data breaches</p></li><li><p>95% of cybersecurity incidents happen because of human mistakes</p></li></ul><p>The M&amp;S and Co-op breaches exemplify how sophisticated attackers target the human element. Scattered Spider reportedly initiated these attacks by impersonating employees and convincing IT help desks to reset passwords. This social engineering tactic bypassed technical controls by exploiting human vulnerabilities.</p><h3>Building an Effective Human Firewall</h3><p>Transforming employees from security liabilities into security assets requires comprehensive education and cultural change:</p><h4>Cybersecurity Awareness Training Evolution</h4><p>Traditional security awareness programs are evolving into more sophisticated approaches focused on behaviour change rather than just knowledge transfer. IBM notes that "Nearly 95% of human thinking and decision making is controlled by System 1, which is our habitual way of thinking." Effective training must address this by creating security-conscious habits rather than merely providing information.</p><p>Modern training approaches include:</p><ol><li><p><strong>Personalized, role-specific training</strong>: Tailoring content to specific job functions and risk profiles.</p></li><li><p><strong>Simulated attacks</strong>: Conducting realistic phishing, vishing, and smishing simulations to build practical skills.</p></li><li><p><strong>Continuous reinforcement</strong>: Providing regular, bite-sized training modules rather than annual compliance exercises.</p></li><li><p><strong>Gamification and engagement</strong>: Using competition and rewards to motivate ongoing participation.</p></li><li><p><strong>Behavioural analytics</strong>: Employing AI to analyse employee behaviour and deliver targeted interventions.</p></li></ol><p>Despite these advances, there are still significant gaps in implementation. As of 2024, 45% of employees report receiving no security training from their employers, and 62% of companies do not conduct sufficient security awareness training to see significant benefits.</p><h4>From Awareness to Culture</h4><p>Building a robust security culture goes beyond training to create an environment where security becomes part of everyday decision-making. This requires:</p><ol><li><p><strong>Leadership commitment</strong>: Visible support from executives and managers for security initiatives.</p></li><li><p><strong>Positive reinforcement</strong>: Recognizing and rewarding security-conscious behaviours rather than punishing mistakes.</p></li><li><p><strong>Clear expectations</strong>: Establishing and communicating security responsibilities for all roles.</p></li><li><p><strong>Empowerment</strong>: Giving employees the tools and authority to report and address security concerns.</p></li><li><p><strong>Continuous improvement</strong>: Regularly evaluating and enhancing security culture initiatives.</p></li></ol><p>Organizations that successfully implement these strategies can expect significant benefits. Properly implemented cybersecurity awareness training can lead to a 70% reduction in security-related risks, and users who have undergone phishing awareness training are 30% less likely to click on phishing links.</p><h2>The Current State: Retail Sector Under Siege</h2><p>The recent spate of attacks on UK retailers provides a revealing case study of current cybersecurity challenges:</p><h3>The M&amp;S, Harrods, and Co-op Attacks</h3><p>In April and May 2025, three major UK retailers experienced significant cyber attacks:</p><ol><li><p><strong>Marks &amp; Spencer</strong>: The attack began around April 21, with customers reporting issues with contactless payments and click-and-collect services. By April 25, M&amp;S suspended all online orders and removed job listings from its website. Weeks later, the company was still unable to process online sales and acknowledged that customer data had been stolen. The attack has cost M&amp;S millions in lost revenue and wiped approximately &#163;700 million from its market value.</p></li><li><p><strong>Co-op Group</strong>: Shortly after the M&amp;S attack, Co-op revealed it had also been targeted. The company shut down parts of its IT system, affecting back-office and call centre functions. It later acknowledged that data from a significant number of current and past members had been stolen, including personal information such as names, contact details, and dates of birth.</p></li><li><p><strong>Harrods</strong>: On May 1, the luxury retailer confirmed it had experienced unauthorized access attempts to its systems. While Harrods managed to contain the breach more effectively than M&amp;S, internal files, including employee data, were reportedly accessed.</p></li></ol><h3>Attack Vectors and Techniques</h3><p>These attacks demonstrate the sophistication of modern threat actors:</p><ul><li><p><strong>Social engineering</strong>: The attackers reportedly used sophisticated social engineering techniques, including impersonating employees to convince IT help desks to reset passwords.</p></li><li><p><strong>Ransomware deployment</strong>: In the case of M&amp;S, attackers reportedly used the DragonForce ransomware to encrypt virtual machines.</p></li><li><p><strong>Identity-based attacks</strong>: The attackers targeted credentials and access controls rather than attempting to directly breach perimeter defences.</p></li></ul><p>The attacks have been attributed to DragonForce affiliates, with evidence suggesting involvement from the Scattered Spider/Octo Tempest group. This group has demonstrated a pattern of targeting prominent brands in specific sectors to generate media attention before moving on to other targets.</p><h3>Sectoral Vulnerabilities</h3><p>These incidents highlight specific vulnerabilities in the retail sector:</p><ol><li><p><strong>Underinvestment in security</strong>: Retail organizations often prioritize customer experience and operational efficiency over security investments.</p></li><li><p><strong>Complex digital infrastructure</strong>: Modern retailers operate complex, interconnected systems spanning physical stores, e-commerce platforms, and supply chains.</p></li><li><p><strong>Valuable data assets</strong>: Retailers process and store significant volumes of customer and payment data, making them attractive targets.</p></li><li><p><strong>Skill shortages</strong>: According to recent research, 83% of UK organizations are grappling with a shortage of skilled cybersecurity professionals.</p></li></ol><p>Cabinet Office minister Pat McFadden described the wave of attacks on UK businesses as a "wake-up call" for the industry, highlighting the need for organizations to reassess their security strategies.</p><h2>Are We Approaching "The Big One"?</h2><p>The concept of "the big one"&#8212;a catastrophic cyber event that fundamentally changes security culture and practice&#8212;looms large in cybersecurity discussions. Are we approaching such an event?</p><h3>Signs of Growing Risk</h3><p>Several factors suggest the potential for a major, paradigm-shifting cyber event:</p><ol><li><p><strong>Increasing attack sophistication</strong>: Threat actors are employing increasingly advanced techniques, including AI-enhanced attacks and deepfakes. According to Gartner, around 50% of executives believe Generative AI will advance adversarial capabilities such as phishing, malware, and deepfakes.</p></li><li><p><strong>Critical infrastructure targeting</strong>: Attacks are increasingly targeting essential services and infrastructure, with the potential for significant real-world impacts.</p></li><li><p><strong>Supply chain vulnerabilities</strong>: In 2024, 183,000 customers were affected by supply chain cyber attacks, an increase of 33% from the previous year.</p></li><li><p><strong>Ransomware evolution</strong>: Ransomware operators are moving to subscription models, enabling even low-skilled criminals to launch sophisticated attacks.</p></li><li><p><strong>Geopolitical tensions</strong>: Rising international conflicts are accompanied by increased state-sponsored cyber activities.</p></li></ol><p>The potential impact of a major cyber event could be catastrophic. The reported costs of cyber attacks are projected to reach $10.5 trillion annually by 2025, according to Cybersecurity Ventures, while another forecast places the cost of cybercrime at $23 trillion by 2027.</p><h3>Evaluating Readiness</h3><p>Despite growing awareness of cyber risks, organizational readiness remains concerning:</p><ol><li><p><strong>The resilience gap</strong>: The divide between resilient organizations and those struggling has become stark, with the number of organizations maintaining minimum viable cyber resilience declining by 30% in 2024.</p></li><li><p><strong>Resource constraints</strong>: A lack of resources and skills is the biggest challenge for 52% of organizations in designing cyber resilience.</p></li><li><p><strong>Legacy technology</strong>: Transforming legacy technology and processes remains a significant barrier to improved security.</p></li><li><p><strong>Human factors</strong>: Despite their critical role, human-centric security measures remain underdeveloped in many organizations.</p></li></ol><p>These factors suggest that while a catastrophic cyber event is increasingly possible, many organizations remain unprepared to prevent or respond effectively to such an event.</p><h2>The Path Forward: Integrated, Continuous Security</h2><p>As we consider the future of cybersecurity, several key principles emerge for building more resilient organizations:</p><h3>Embracing the MITRE ATT&amp;CK Framework</h3><p>The MITRE ATT&amp;CK framework provides a valuable foundation for modern security strategies. By categorizing and mapping adversary tactics, techniques, and procedures, it enables organizations to develop specific threat models and implement appropriate countermeasures.</p><p>For 2025, the MITRE ATT&amp;CK Evaluations are focusing on cloud-based attacks, response and containment strategies, and post-incident analysis, reflecting the evolving threat landscape. Organizations can use this framework to enhance threat intelligence, detection capabilities, and incident response procedures.</p><h3>Implementing Continuous Security Approaches</h3><p>Moving beyond point-in-time assessments to continuous security monitoring provides several advantages:</p><ol><li><p><strong>Reduced exposure window</strong>: Continuous testing dramatically reduces the time between vulnerability creation and detection.</p></li><li><p><strong>Adaptive defence</strong>: Organizations can quickly adjust their security posture in response to emerging threats.</p></li><li><p><strong>Comprehensive coverage</strong>: Continuous approaches can cover a broader range of systems and attack vectors.</p></li><li><p><strong>Improved resource allocation</strong>: Organizations can prioritize remediation efforts based on real-time risk assessments.</p></li></ol><h3>Strengthening the Human Firewall</h3><p>Enhancing human-centric security measures is essential for addressing the root causes of many breaches:</p><ol><li><p><strong>Behavioural security</strong>: Focus on changing behaviours rather than just increasing awareness.</p></li><li><p><strong>Personalized training</strong>: Tailor security education to specific roles, risks, and learning styles.</p></li><li><p><strong>Positive security culture</strong>: Build an environment where security is valued and rewarded rather than seen as an obstacle.</p></li><li><p><strong>Leadership engagement</strong>: Ensure visible support from executives and managers for security initiatives.</p></li></ol><h3>Preparing for "The Big One"</h3><p>Organizations should take proactive steps to prepare for potentially catastrophic cyber events:</p><ol><li><p><strong>Scenario planning</strong>: Develop and test response plans for various high-impact cyber scenarios.</p></li><li><p><strong>Resilience investments</strong>: Focus on building systems and processes that can withstand and recover from major attacks.</p></li><li><p><strong>Collaborative defence</strong>: Participate in industry information sharing and collective defence initiatives.</p></li><li><p><strong>Supply chain security</strong>: Implement robust third-party risk management processes.</p></li></ol><h2>No Silver Bullet, but a Way Forward</h2><p>The question of whether we'll ever find a "silver bullet" for cybersecurity has a clear answer: no. The complexity and dynamism of the threat landscape, combined with the inherent vulnerabilities of human-computer interaction, mean that perfect security will remain elusive.</p><p>However, by moving beyond point-in-time testing to continuous, integrated security approaches that address both technical and human factors, organizations can significantly improve their ability to prevent, detect, and respond to cyber threats. The MITRE ATT&amp;CK framework provides a valuable foundation for these efforts, enabling organizations to understand and counter adversary tactics and techniques.</p><p>As for "the big one"&#8212;a catastrophic cyber event that forces a paradigm shift in security practice&#8212;the signs suggest that the risk is growing. The increasing sophistication of attacks, the expanding attack surface, and the critical nature of digital systems in modern society all point to the potential for a major cyber event with far-reaching consequences.</p><p>The clock may indeed be ticking toward midnight for such an event. However, by implementing the principles outlined in this article, organizations can improve their readiness and resilience, potentially mitigating the impact of even the most severe cyber attacks.</p><p>In the end, effective cybersecurity is not about finding a single solution, but about building a comprehensive, adaptive defence that evolves alongside the threat landscape. By embracing continuous security approaches, strengthening the human firewall, and leveraging frameworks like MITRE ATT&amp;CK, organizations can navigate the challenging cybersecurity landscape of 2025 and beyond.</p>]]></content:encoded></item><item><title><![CDATA[Brief: Tech Sector Begins to Adapt as Tariffs Take Hold]]></title><description><![CDATA[One month after President Trump&#8217;s tariffs on imported semiconductors and key technology components took effect, the U.S.]]></description><link>https://blog.mustardtreegroup.com/p/brief-tech-sector-begins-to-adapt</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/brief-tech-sector-begins-to-adapt</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Mon, 05 May 2025 19:43:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!q0xP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q0xP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q0xP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg 424w, https://substackcdn.com/image/fetch/$s_!q0xP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg 848w, https://substackcdn.com/image/fetch/$s_!q0xP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!q0xP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q0xP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:9443894,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://sodekunle.substack.com/i/162916393?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!q0xP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg 424w, https://substackcdn.com/image/fetch/$s_!q0xP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg 848w, https://substackcdn.com/image/fetch/$s_!q0xP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!q0xP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63f77c74-fafd-49e5-9fc1-73c6d8dd4098_7952x5304.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@thisisengineering?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">ThisisEngineering</a> on <a href="https://unsplash.com/photos/woman-in-white-long-sleeve-shirt-using-black-laptop-computer-ZPeXrWxOjRQ?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">Unsplash</a></figcaption></figure></div><p></p><p>One month after President Trump&#8217;s tariffs on imported semiconductors and key technology components took effect, the U.S. tech sector is showing early signs of adaptation &#8212; even as uncertainty lingers. While short-term disruptions remain evident, major firms are beginning to implement strategic pivots to blunt the impact of higher costs and shifting supply dynamics.</p><p><strong>Market Reaction Stabilizes &#8212; but Divergence Emerges</strong></p><p>The initial selloff in tech stocks has plateaued, with the Nasdaq 100 recovering 2.5% in April after a steep early-month dip. However, investor behavior remains cautious. AI hardware firms such as Nvidia and AMD have stabilized but continue to trade below pre-tariff valuations. Meanwhile, companies with diversified manufacturing bases, like Apple and Intel, have outperformed sector averages, suggesting that markets are beginning to reward supply chain agility.</p><p><strong>Supply Chain Reconfiguration Underway</strong></p><p>According to a mid-April report by Deloitte, over 40% of U.S. tech firms are actively evaluating alternate suppliers outside traditional hubs like Taiwan and China. Countries such as Vietnam, Malaysia, and India are seeing increased interest. While full relocation remains costly, incremental outsourcing and risk distribution are becoming the norm.</p><p>Domestically, chipmakers are accelerating partnerships with U.S.-based fabrication startups, some of which have received increased attention &#8212; and investment &#8212; due to federal incentives quietly expanded alongside the tariffs.</p><p><strong>Infrastructure and Cost Pressures Persist</strong></p><p>CBRE has revised its earlier estimate, now projecting that construction costs for data centers and related infrastructure could rise by as much as 7% by Q3 2025, as materials subject to tariffs become scarcer and more expensive. Some projects in early development stages have already been paused or re-scoped.</p><p><strong>Policy and Corporate Strategy Align</strong></p><p>There&#8217;s a notable trend of alignment between corporate strategy and federal policy objectives. Apple has broken ground on its Houston expansion and confirmed that a portion of its MacBook production will begin stateside by late 2025. TSMC&#8217;s Arizona project, while still in early phases, received expedited permitting support &#8212; suggesting stronger collaboration between public and private stakeholders.</p><p><strong>Looking Ahead</strong></p><p>Though the full implications of the tariffs are still unfolding, the technology sector is gradually absorbing the shock and beginning to pivot. The winners in this new environment will likely be those who act swiftly to localize production, hedge supply risks, and build strategic partnerships within the U.S. manufacturing ecosystem.</p><p>For now, the question remains: can domestic production scale fast enough to offset the pressures &#8212; and will the political calculus behind these tariffs ultimately prove beneficial?</p>]]></content:encoded></item><item><title><![CDATA[Alibaba's Qwen 3 Launch: A Strategic Pivot in China's AI Arms Race]]></title><description><![CDATA[Alibaba's unveiling of Qwen 3, the latest generation in its family of large language models (LLMs), represents a significant milestone in China's artificial intelligence (AI) development.]]></description><link>https://blog.mustardtreegroup.com/p/alibabas-qwen-3-launch-a-strategic</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/alibabas-qwen-3-launch-a-strategic</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Tue, 29 Apr 2025 08:44:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JvKk!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d330ce-e3f8-4a23-b8c7-8e86d3602f01_398x398.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Alibaba's unveiling of Qwen 3, the latest generation in its family of large language models (LLMs), represents a significant milestone in China's artificial intelligence (AI) development. Designed as a superior alternative to the DeepSeek R1, Qwen 3 integrates hybrid reasoning capabilities and extended context windows, offering open-source access to a wide developer base. The launch reflects China&#8217;s accelerated ambitions to dominate AI on both domestic and global fronts, and signals Alibaba's intent to reassert leadership in a hyper-competitive, innovation-driven space.</p><p><strong>Context and Background</strong></p><p>The release of Qwen 3 arrives amid intensifying competition within China's AI sector. DeepSeek's R1, launched earlier in 2025, received considerable acclaim for its performance across mathematical and reasoning benchmarks, quickly establishing itself as a benchmark-setter. Alibaba's earlier iteration, Qwen 2.5-Max, already showed signs of competitive parity, outperforming DeepSeek V3 in several evaluation frameworks such as Arena-Hard and LiveBench.</p><p>Meanwhile, Baidu continues to push its Ernie series models, including the newly launched Ernie 4.5 Turbo and Ernie X1 Turbo. These rapid developments mirror China's broader AI strategy: driving homegrown innovation to reduce dependence on Western technology and foster domestic ecosystems of applied AI solutions.</p><p>With regulatory frameworks becoming more accommodating and capital continuing to flow into foundational model R&amp;D, Alibaba&#8217;s Qwen 3 is the company's most aggressive move yet to claim a stake in this evolving frontier.</p><div><hr></div><p><strong>Core Analysis</strong></p><p><strong>Model Architecture and Performance</strong></p><p>Qwen 3 is available in various model sizes, including the flagship Qwen3-235B-A22B, and features significant architectural upgrades. These include hybrid reasoning capabilities that combine symbolic and neural processing pathways to enhance decision-making depth and precision. Notably, Qwen 3 supports extended context lengths of up to 131,072 tokens for models at 4B size and above, positioning it for more complex, multi-turn interactions and long-form content synthesis.</p><p>Performance benchmarks indicate that Qwen 3 has outperformed notable competitors across several fronts:</p><ul><li><p>On Codeforces, it surpasses OpenAI's o3-mini and Google&#8217;s Gemini 2.5 Pro.</p></li><li><p>On reasoning-centric tests such as AIME and BFCL, it has shown higher consistency in accuracy and interpretability.</p></li><li><p>In multilingual evaluations, Qwen 3 demonstrates competitive proficiency across Chinese, English, and mixed-language inputs.</p></li></ul><p><strong>Open-Source Availability</strong></p><p>Perhaps the most strategically significant aspect of the launch is Qwen 3's open-source availability. Hosted across platforms including Hugging Face and GitHub, the models come with a permissive license that enables research and commercial use. This contrasts sharply with many U.S.-based counterparts which often restrict model weights or impose usage limitations.</p><p>By opening the architecture, Alibaba is not only inviting global collaboration but also contributing to the maturation of the Chinese open-source AI community&#8212;an essential component in reducing foreign dependency.</p><div><hr></div><p><strong>Strategic Implications</strong></p><p><strong>Domestic AI Ecosystem Strengthening</strong></p><p>The release reinforces Alibaba&#8217;s role as a core AI innovator within China. By competing head-to-head with DeepSeek and Baidu, Alibaba is catalysing a virtuous cycle of innovation. The availability of a top-tier open-source model could drive faster iteration cycles, as startups, academic labs, and enterprises integrate and adapt Qwen 3 for localized needs.</p><p><strong>Geopolitical and Industrial Positioning</strong></p><p>At a geopolitical level, Qwen 3 exemplifies China's strategic pivot toward technological self-sufficiency. The capabilities it introduces also have direct implications for sectors like defence, cybersecurity, and language processing across Chinese dialects, which have historically lacked sufficient NLP support.</p><p>For industries, the implications are equally expansive:</p><ul><li><p><strong>Enterprise Software</strong>: Integration into vertical SaaS platforms for legal, finance, and HR analytics.</p></li><li><p><strong>Manufacturing &amp; Logistics</strong>: Enhanced digital twins, predictive maintenance, and AI-driven optimization.</p></li><li><p><strong>Healthcare</strong>: Advanced biomedical literature synthesis and diagnostic support tools.</p></li></ul><p><strong>Competitive Pressures on Western Firms</strong></p><p>Alibaba's aggressive open-sourcing strategy places pressure on Western AI developers to reconsider closed-model frameworks. It introduces a credible alternative to OpenAI's GPT and Google's Gemini series, especially for organizations prioritizing cost-efficiency, local data sovereignty, and customizable AI stacks.</p><div><hr></div><p><strong>Forward Outlook</strong></p><p>The launch of Qwen 3 marks not only a technical leap but a strategic recalibration. Alibaba is signalling that it aims to be a foundational actor in shaping the future of global AI infrastructure. The company's emphasis on open development, hybrid reasoning, and performance transparency sets new precedents in both China and abroad.</p><p>Looking forward, three critical scenarios merit attention:</p><ol><li><p><strong>Ecosystem Acceleration</strong>: An uptick in AI-native applications leveraging Qwen 3 in both Chinese and international markets.</p></li><li><p><strong>Policy Interventions</strong>: Chinese regulators may introduce frameworks to favour open-source model adoption, catalysing broader systemic shifts.</p></li><li><p><strong>Cross-border Collaborations</strong>: With open access, Alibaba may attract Western and Global South developers, forging a more multipolar AI ecosystem.</p></li></ol><p>Qwen 3 is more than an engineering achievement; it is a strategic instrument in China's evolving AI doctrine. For executives, policymakers, and technologists alike, the model's release demands close scrutiny and calibrated engagement.</p><p></p><p><strong>Lgger Analytics |</strong> <strong>Date: April 29, 2025</strong></p>]]></content:encoded></item><item><title><![CDATA[Fintech in West Africa: A Booming Industry With ESG on the Horizon]]></title><description><![CDATA[West Africa has emerged as one of the most vibrant and rapidly evolving fintech ecosystems in Africa.]]></description><link>https://blog.mustardtreegroup.com/p/fintech-in-west-africa-a-booming</link><guid isPermaLink="false">https://blog.mustardtreegroup.com/p/fintech-in-west-africa-a-booming</guid><dc:creator><![CDATA[Samuel Odekunle]]></dc:creator><pubDate>Tue, 08 Apr 2025 07:18:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PpQh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PpQh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PpQh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PpQh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PpQh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PpQh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PpQh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg" width="2971" height="2228" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2228,&quot;width&quot;:2971,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1496291,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://sodekunle.substack.com/i/160843311?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F250cc8ef-802a-425b-b5e0-139a1aed19ed_3024x4032.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PpQh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PpQh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PpQh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PpQh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a59048b-2d46-409d-83a6-0a2f9281c571_2971x2228.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>West Africa has emerged as one of the most vibrant and rapidly evolving fintech ecosystems in Africa. Driven by mobile-first innovation, increasing financial inclusion needs, and a young, tech-savvy population, fintech startups have become a transformative force across the region. Nigeria, Ghana, Senegal, and C&#244;te d&#8217;Ivoire are at the forefront of this evolution, with each country contributing to a growing web of digital financial services that now stretch beyond borders.</p><p>Yet, while financial inclusion and innovation remain top priorities, there's a growing conversation around Environmental, Social, and Governance (ESG) responsibility in the fintech sector. As global and local investors begin to demand greater accountability and transparency, the intersection of fintech and ESG is becoming more important than ever.</p><p>This report dives into the fintech landscape in West Africa, exploring key players, investment flows, and the budding but crucial role ESG is beginning to play.</p><div><hr></div><p><strong>The State of Fintech in West Africa</strong></p><p>West African fintech has experienced explosive growth in the last decade. The region&#8217;s fintech startups raised hundreds of millions in funding in 2024 alone, with Nigeria reclaiming its position as the top destination for venture capital on the continent, drawing over $520 million in equity funding across 103 deals.</p><p>The main drivers of this boom include:</p><ul><li><p><strong>High mobile penetration</strong>: Mobile phone usage across West Africa has soared in the past decade. With smartphones becoming more affordable and mobile networks expanding into rural regions, the majority of the population&#8212;especially the youth&#8212;now has access to digital tools. This high level of mobile adoption provides the essential infrastructure for mobile banking, mobile payments, and financial apps to thrive.</p></li><li><p><strong>A large unbanked population</strong>: A significant portion of West Africans still lack access to formal banking services. In Nigeria, for instance, more than 60 million adults are unbanked. Fintechs are seizing this opportunity to introduce digital wallets, agent banking, and other solutions that bypass traditional banks and deliver financial services directly via mobile phones.</p></li><li><p><strong>Underdeveloped traditional banking systems</strong>: In many areas, brick-and-mortar banks are either non-existent or difficult to access. Bureaucracy, high fees, and documentation requirements have also deterred many from engaging with traditional banks. Fintech startups are filling this vacuum with agile, customer-centric alternatives that prioritize accessibility and ease of use.</p></li><li><p><strong>A youthful, entrepreneurial demographic</strong>: West Africa has one of the youngest populations globally. With growing internet literacy, digital fluency, and a hunger for innovation, young people are both consumers and creators in the fintech space. Many of the region's fintech founders are under 35, building products tailored to the needs of their peers and leveraging mobile-first platforms to scale quickly.</p></li></ul><p>These conditions have fostered innovation in mobile payments, digital banking, micro-lending, savings platforms, and cross-border transactions.</p><div><hr></div><p><strong>Top Fintech Startups by Country</strong></p><p><em>Nigeria</em>:</p><ul><li><p><strong>Flutterwave</strong>: Payments infrastructure powerhouse valued over $3B.</p></li><li><p><strong>Paystack</strong>: Online payments giant, acquired by Stripe in 2020.</p></li><li><p><strong>Kuda</strong>: A leading digital bank with over $90M in funding.</p></li><li><p><strong>PiggyVest &amp; Cowrywise</strong>: Digital savings and investment platforms.</p></li><li><p><strong>Moniepoint</strong>: Agent banking and SME-focused digital services.</p></li></ul><p><em>Ghana</em>:</p><ul><li><p><strong>Zeepay</strong>: Mobile money and remittance services.</p></li><li><p><strong>Dash</strong>: Cross-border wallet interoperability.</p></li><li><p><strong>BezoMoney</strong>: Social savings for underserved communities.</p></li></ul><p><em>Senegal</em>:</p><ul><li><p><strong>Wave</strong>: No-fee mobile money disrupting telco-led models.</p></li><li><p><strong>PayDunya</strong>: Payment gateway for Francophone markets.</p></li><li><p><strong>MaTontine</strong>: Digitizing group savings and micro-lending.</p></li></ul><p><em>C&#244;te d&#8217;Ivoire</em>:</p><ul><li><p><strong>Julaya</strong>: B2B digital payment and payroll solutions.</p></li><li><p><strong>CinetPay</strong>: Secure payments for e-commerce.</p></li><li><p><strong>Djamo</strong>: Neobank offering cards and financial literacy.</p></li></ul><div><hr></div><p><strong>Investment Flows and Key Investors</strong></p><p>West African fintech continues to attract global capital at impressive rates. In 2024, fintech startups across Africa secured roughly $1.4 billion, and West Africa claimed a large share of that, especially in Nigeria.</p><p>Notable investment highlights:</p><ul><li><p><strong>Moniepoint (Nigeria)</strong> raised $110M, reaching unicorn status.</p></li><li><p><strong>Flutterwave</strong> continues to expand after a $250M Series D.</p></li><li><p><strong>Kuda</strong>, <strong>FairMoney</strong>, and <strong>Chipper Cash</strong> also received multimillion-dollar funding rounds.</p></li></ul><p>Key investors fueling this growth include:</p><ul><li><p><strong>Development Partners International (DPI)</strong></p></li><li><p><strong>Google Africa Investment Fund</strong></p></li><li><p><strong>Partech Africa</strong> (launched a $300M Africa-focused fund)</p></li><li><p><strong>TLcom Capital</strong> and <strong>Norrsken22</strong></p></li><li><p><strong>IFC and FMO</strong>, development finance institutions pushing impact-oriented investments</p></li></ul><p>These investors are not only injecting capital but also introducing governance frameworks, ESG reporting requirements, and long-term scaling strategies.</p><div><hr></div><p><strong>The ESG Conversation: Early but Growing</strong></p><p>While fintech is primarily seen as a tool for financial access and innovation, its potential as an ESG-aligned sector is becoming clearer. Here&#8217;s how ESG factors are starting to influence fintech in West Africa:</p><p><strong>Environmental (E)</strong></p><ul><li><p>Fintech platforms inherently reduce the carbon footprint by digitizing previously paper-heavy, in-person banking.</p></li><li><p>Emerging interest in climate-linked financial products, such as green loans and climate insurance.</p></li><li><p>Agricultural fintechs are beginning to integrate weather and sustainability data into their credit models.</p></li></ul><p><strong>Social (S)</strong></p><ul><li><p>The strongest ESG alignment exists here:</p><ul><li><p>Platforms like <strong>Moniepoint</strong>, <strong>Opay</strong>, <strong>Paga</strong>, and <strong>Wave</strong> bring banking services to remote, underbanked areas.</p></li><li><p><strong>BezoMoney</strong> and <strong>MaTontine</strong> empower women and informal entrepreneurs.</p></li><li><p>Products promote financial literacy, savings culture, and economic inclusion.</p></li></ul></li></ul><p><strong>Governance (G)</strong></p><ul><li><p>As startups mature, there's a visible push toward:</p><ul><li><p>Stronger AML/KYC protocols</p></li><li><p>Responsible lending standards</p></li><li><p>Transparent data privacy and protection measures</p></li></ul></li><li><p>Investors are requiring ESG reporting as a precondition for funding.</p></li></ul><div><hr></div><p><strong>Challenges in ESG Integration</strong></p><p>Despite progress, several challenges remain:</p><ul><li><p><strong>Limited environmental focus</strong> compared to social goals: While fintech platforms often create indirect environmental benefits by digitizing services and reducing the need for physical infrastructure, very few have direct strategies aimed at environmental sustainability. There's a noticeable absence of green financial products, carbon footprint tracking, or support for eco-friendly sectors like renewable energy or sustainable agriculture. This leaves a gap where fintech could play a greater role in environmental stewardship.</p></li><li><p><strong>Lack of standardized ESG metrics</strong> among startups: Most early- and even mid-stage fintechs do not yet report on ESG indicators in a structured or consistent way. Metrics such as gender inclusion, carbon savings, or data transparency are rarely tracked or shared publicly. This makes it difficult for investors and stakeholders to evaluate the impact or sustainability of these businesses, and it hampers efforts to benchmark or scale ESG initiatives across the industry.</p></li><li><p><strong>Governance practices vary widely</strong>, especially in early-stage companies: While some well-funded fintechs adopt strong internal governance practices, others&#8212;especially startups in early growth phases&#8212;lack formal boards, risk management protocols, or compliance departments. This inconsistency can lead to poor decision-making, vulnerabilities in cybersecurity, or difficulty in scaling operations responsibly. As regulatory scrutiny increases, governance will become a make-or-break factor.</p></li><li><p><strong>Some startups face criticism over aggressive lending and debt recovery tactics</strong>: In the race for market share, some digital lenders have been accused of high-interest rates, predatory lending models, and invasive debt collection practices. This undermines the trust they seek to build with users and can contradict the broader ESG objective of promoting fair and inclusive finance. Addressing this issue requires a balance between innovation, profitability, and consumer protection.</p></li></ul><p>Still, there's clear momentum. ESG is no longer a Western buzzword&#8212;it&#8217;s becoming an operational lens for long-term success in West African fintech.</p><div><hr></div><p><strong>What&#8217;s Next? Opportunities Ahead</strong></p><p>The intersection of ESG and fintech is full of opportunity:</p><ul><li><p><strong>Green lending models</strong> for agriculture and clean energy financing: These models enable fintech platforms to offer loans specifically tied to eco-conscious initiatives. For agriculture, this may include credit to farmers who adopt sustainable farming practices, such as water-efficient irrigation or organic inputs. In clean energy, it supports consumers and SMEs who invest in solar systems, biodigesters, or electric mobility solutions. By tying financial support to environmental impact, fintechs create incentives for sustainable behavior while opening new markets.</p></li><li><p><strong>Digital identity and inclusive KYC solutions</strong>: Traditional Know Your Customer (KYC) protocols often exclude individuals lacking formal ID documentation, a common barrier in many West African regions. Inclusive digital identity solutions&#8212;such as biometric verification, mobile-based ID registration, and blockchain-backed credentials&#8212;are allowing more people to access financial services securely and conveniently. Fintechs that adopt such systems are helping bridge the identity gap and reduce exclusion from the formal financial system.</p></li><li><p><strong>ESG analytics-as-a-service</strong> platforms for African startups: These are emerging tools or service providers that help startups track, report, and improve their ESG metrics. They might offer dashboards that monitor carbon savings, social impact (like gender inclusion), or governance risks. This is especially helpful for early-stage fintechs seeking to attract institutional capital or development finance, as it aligns them with international reporting standards without requiring large in-house compliance teams.</p></li><li><p><strong>Ethical AI and data governance</strong> embedded in credit scoring and risk systems: As AI becomes central to credit decisions, ethical considerations are paramount. Ethical AI ensures models are free from biases that might marginalize vulnerable groups. Coupled with data governance practices that prioritize consent, transparency, and privacy, fintechs can build trust and avoid regulatory backlash. In credit scoring, this means using explainable algorithms and allowing users insight into how their financial behavior influences their eligibility.</p></li></ul><p>As investors continue to demand impact metrics and regulators sharpen oversight, the fintechs that proactively embed ESG will be the ones best positioned for scale, resilience, and global partnerships.</p><div><hr></div><p>West African fintech is in a golden age of expansion, powered by innovation and a hunger to solve local financial challenges. The ESG wave is still gathering force, but early adopters are already laying the foundation for sustainable, inclusive growth.</p><p>As fintech startups in the region continue to scale across borders and verticals, those who align profits with purpose&#8212;especially in financial inclusion, good governance, and environmental stewardship&#8212;will lead the way into a future where tech does more than disrupt: it empowers.</p>]]></content:encoded></item></channel></rss>