Blog

Insights on Security & Compliance

Best practices, industry trends, and expert advice to help your team stay secure and compliant.

[Security]February 24, 2026

OpenClaw Infostealer Attack: What the First AI Agent Identity Theft Means for Your Security

Infostealer malware stole OpenClaw AI agent configs, gateway tokens, and behavioral guidelines. With 135,000+ exposed instances and 1,184 malicious skills, here's what security teams need to know.

Alban VeautéAlban Veauté
Read article

OWASP MCP Security Guide: What It Gets Right, What's Missing, and How to Actually Implement It

OWASP released a practical guide for secure MCP server development. We analyze the 8 security domains, highlight what matters most for SaaS companies, and connect it to SOC 2 and ISO 27001 compliance.

[Security]FEB 20

Cyber Essentials and Cyber Essentials Plus Checklist for UK Startups

A comprehensive checklist for UK startups preparing for Cyber Essentials and Cyber Essentials Plus certification, covering all five technical controls.

[Compliance]FEB 18

npm Supply Chain Attacks in 2026: What SaaS Engineering Teams Must Know

npm supply chain attacks are no longer theoretical. With Shai-Hulud compromising 796 packages and the September 2025 hijacking affecting 2 billion weekly downloads, SaaS teams need practical defenses beyond npm audit.

[Security]FEB 14

AI Agent Security Guardrails: What SOC 2 and ISO 27001 Certified SaaS Companies Need Now

Compliance frameworks are catching up to AI agents. If you're SOC 2 or ISO 27001 certified and shipping autonomous AI features, here's how to build guardrails that satisfy auditors while enabling innovation.

[Compliance]FEB 13

AI-Enabled Attack Patterns: What SaaS Companies Need to Know from Google's Q4 2025 Threat Report

Google's Threat Intelligence Group identified three emerging AI attack patterns in Q4 2025: distillation attacks, AI-powered malware, and nation-state AI integration. Here's what SaaS companies need to understand and how to defend against these evolving threats.

[Security]FEB 13

Most Common Exceptions Found During a SOC 2 Audit

Learn the most common SOC 2 audit exceptions, from access control gaps to missing evidence, and how to prevent them before your next audit.

[Compliance]FEB 13

Phishing in 2026: ClickFix, Adversary-in-the-Middle, and AI-Powered Social Engineering

Phishing has evolved beyond Nigerian prince emails. Modern attacks use ClickFix techniques to trick users into running malicious commands, adversary-in-the-middle proxies to bypass MFA, and AI-generated content indistinguishable from legitimate communications. Here's how to update your defenses.

[Security]FEB 13

Supabase Security Best Practices for Production Apps

Learn how to secure your Supabase application with Row Level Security, proper authentication, API key management, and more. Prevent data breaches with this comprehensive security guide.

[Security]FEB 6

Moltbook Data Breach: AI Agent Security Lessons

In January 2026, Moltbook exposed 1.5 million API keys due to a Supabase misconfiguration. Learn what went wrong and how to prevent similar database security failures.

[Security]FEB 3

The Top AWS Security Misconfigurations we Find in Customer Environments

Unencrypted databases, exposed endpoints, IAM misuse: discover the AWS misconfigurations we fix most often during SOC 2 and ISO 27001 audits.

[Security]FEB 1

2026 Supply Chain Security Report: Lessons from a Year of Devastating Attacks

Software supply chain attacks doubled in 2025, with global losses reaching $60 billion. Analyze major attacks like Shai-Hulud, learn SOC 2 and ISO 27001 compliance requirements, and implement practical defenses.

[Security]JAN 30

ISO 42001: Do You Need It If You Only Use AI APIs?

Do you need ISO 42001 if you only use AI APIs? Learn the key differences between AI developers and AI consumers for compliance.

[Compliance]JAN 29

Secrets Management 101: Stop Storing Credentials in .env Files

Learn why .env files are a security risk - especially with AI coding agents - and how to implement proper secrets management with tools like Vault, AWS Secrets Manager, and Doppler.

[Security]JAN 27

MDM for Startups: Why We Built a Security-First Solution

We built an MDM that gives startups real device security (encryption, remote wipe, inventory) without enterprise bloat, reducing risk, simplifying compliance, and avoiding yet another vendor.

[Security]JAN 23

Bastion Joins the AWS ISV Accelerate Program

We're excited to announce that Bastion has joined the AWS ISV Accelerate Program, strengthening our partnership with AWS to deliver faster, more streamlined compliance solutions to startups and scaleups building on AWS.

[Company News]JAN 9

Understanding Shared Responsibility Models with Third-Party Providers

Many B2B SaaS companies misunderstand shared responsibility models when using cloud and SaaS providers, creating security gaps and compliance failures. Learn how responsibility shifts across IaaS, PaaS, and SaaS, and how to document it for SOC 2 and ISO 27001.

[Compliance]DEC '25

Which Software Should Be in Your SOC 2 and ISO 27001 Vendor Management Review?

B2B SaaS companies struggle to determine which vendors should be in their compliance vendor management program. Learn the decision framework to identify in-scope software for SOC 2 and ISO 27001.

[Compliance]NOV '25

Nx Supply Chain Attack Exposes Thousands of Developer Credentials on Github - What you should do to keep your organization secure

In August 2025, attackers compromised popular Nx npm packages, embedding malware that stole developer credentials and published them openly on GitHub. Millions risk exposure, from API keys to cloud access tokens. Organizations must urgently rotate credentials, update dependencies, audit logs, and adopt stricter supply chain security practices.

[Security]SEP '25

SOC 2 vs. ISO 27001 vs. GDPR: Which Compliance Framework Does Your Business Need?

B2B SaaS startups often consider three major compliance frameworks: SOC 2, ISO 27001, and GDPR. Which one should your business prioritize? Let's break it down.

[Compliance]MAR '25

Everything SaaS Startups Need to Know About ISO 27001

Discover the ISO 27001 standard and its importance for your Startup. Learn its objectives, principles and the steps to certification in order to protect your sensitive data and that of your partners.

[Compliance]MAR '25

DORA Compliance: What You Need to Know Now That the Deadline Has Passed

The DORA compliance deadline passed on January 17, 2025. Learn about ongoing requirements, enforcement risks for non-compliant organizations, and how to achieve compliance if you haven't already.

[Compliance]MAR '25

The Hidden Costs of Compliance: What Compliance Automation Vendors Don't Tell You

Compliance automation platforms promise efficiency, but do they guarantee a smooth compliance & security journey? Startups often face hidden costs, misaligned expectations, and a false sense of security. Learn why automation is just a starting point, and what's really needed for SOC 2 and ISO 27001 success.

[Compliance]MAR '25

SOC 2 & ISO 27001 Without the Headache: The vCISO Approach

Getting SOC 2 or ISO 27001 is crucial for startups but can be time-consuming and complex. Learn how a Virtual CISO streamlines the certification process, reducing delays and ensuring compliance for startups.

[Compliance]MAR '25

MCP Security Risk: Hardcoded Credentials in AI Tool Configurations

48% of MCP servers recommend insecure credential storage. Learn secure alternatives using input variables and vault-based injection.

[Security]JAN '25

Other platforms check the box

We secure the box

Get in touch and learn why hundreds of companies trust Bastion to manage their security and fast-track their compliance.

Get Started