{"id":3263,"date":"2025-01-27T12:15:08","date_gmt":"2025-01-27T12:15:08","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/01\/27\/do-we-really-need-the-owasp-nhi-top-10\/"},"modified":"2025-01-27T12:15:08","modified_gmt":"2025-01-27T12:15:08","slug":"do-we-really-need-the-owasp-nhi-top-10","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/01\/27\/do-we-really-need-the-owasp-nhi-top-10\/","title":{"rendered":"Do We Really Need The OWASP NHI Top 10?"},"content":{"rendered":"<p>\u200bThe Open Web Application Security Project has recently introduced a new Top 10 project &#8211; the Non-Human Identity (NHI) Top 10. For years, OWASP has provided security professionals and developers with essential guidance and actionable frameworks through its Top 10 projects, including the widely used API and Web Application security lists.\u00a0<br \/>\nNon-human identity security represents an emerging\u00a0The Open Web Application Security Project has recently introduced a new Top 10 project &#8211; the Non-Human Identity (NHI) Top 10. For years, OWASP has provided security professionals and developers with essential guidance and actionable frameworks through its Top 10 projects, including the widely used API and Web Application security lists.\u00a0<br \/>\nNon-human identity security represents an emerging\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe Open Web Application Security Project has recently introduced a new Top 10 project &#8211; the Non-Human Identity (NHI) Top 10. For years, OWASP has provided security professionals and developers with essential guidance and actionable frameworks through its Top 10 projects, including the widely used API and Web Application security lists.\u00a0 Non-human identity security represents&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/01\/27\/do-we-really-need-the-owasp-nhi-top-10\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Do We Really Need The OWASP NHI Top 10?<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":3264,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/3263"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=3263"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/3263\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/3264"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=3263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=3263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=3263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}