Understanding Google’s IAP OAuth API Deprecation – Practical OAuth Guidance for Developers & Security Pros
John Giglio John Giglio

Understanding Google’s IAP OAuth API Deprecation – Practical OAuth Guidance for Developers & Security Pros

In January 2025, Google announced the deprecation of its Identity-Aware Proxy (IAP) OAuth 2.0 Admin API, ending support for programmatic creation of OAuth clients and consent brands. By July 2025, all IAP-protected apps will use Google-managed OAuth clients by default, simplifying setup and reducing manual errors. Developers who relied on automation (like Terraform scripts) must update their workflows, while admins should review OAuth fundamentals to ensure secure, compliant integrations. This blog explains the change, its practical impact, and offers vendor-specific guidance for Google, Okta, and Auth0.

Read More
Astaroth, stego C2, and why browser security helps — but won’t stop everything
John Giglio John Giglio

Astaroth, stego C2, and why browser security helps — but won’t stop everything

The recent Astaroth campaign blended classic steganography with modern cloud tactics—hiding its command-and-control data in GitHub-hosted images. Enterprise browsers like Edge, Island, Talon, and Chrome Enterprise can mitigate some of these risks, but they aren’t a silver bullet. This post breaks down the attack, explains where browser-based protections fall short, and ties prevention guidance to CIS Level 1 Controls and other “security hygiene” fundamentals.

Read More
Cybersecurity and Strategic Planning: The Link for Financial Institutions - CLA
John Giglio John Giglio

Cybersecurity and Strategic Planning: The Link for Financial Institutions - CLA

Cybersecurity isn’t a checklist - it’s a strategy conversation. For financial institutions, the difference between compliance and resilience comes down to how well security is woven into planning and decision-making. When cyber risk is treated as a business variable (not just a technical issue) leaders gain clarity, accountability, and confidence in execution.

Your security posture is only as strong as your ability to adapt. Align your defenses with business goals, track what’s working, and revisit assumptions often. That’s how financial institutions move from reacting to risk to managing it with precision.

Read More