<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Adobe Tech Blog - Medium]]></title>
        <description><![CDATA[Join our new blog: https://blog.developer.adobe.com/ - Medium]]></description>
        <link>https://medium.com/adobetech?source=rss----9342990108af---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Adobe Tech Blog - Medium</title>
            <link>https://medium.com/adobetech?source=rss----9342990108af---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Thu, 23 Apr 2026 02:44:40 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/adobetech" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Raising the Bar for AI Assistant in Adobe Experience Platform]]></title>
            <link>https://medium.com/adobetech/raising-the-bar-for-ai-assistant-in-adobe-experience-platform-f45dda4b2783?source=rss----9342990108af---4</link>
            <guid isPermaLink="false">https://medium.com/p/f45dda4b2783</guid>
            <category><![CDATA[enterprise-ai]]></category>
            <category><![CDATA[machine-learning]]></category>
            <category><![CDATA[adobe-experience-platform]]></category>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[platform]]></category>
            <dc:creator><![CDATA[Namita Krishnan]]></dc:creator>
            <pubDate>Wed, 16 Apr 2025 16:54:38 GMT</pubDate>
            <atom:updated>2025-05-07T22:47:00.807Z</atom:updated>
            <content:encoded><![CDATA[<h4>Winning approaches to evaluation and incident prevention.</h4><p>In a <a href="https://blog.developer.adobe.com/ai-assistant-in-adobe-experience-platform-evaluation-and-continual-improvement-7cbc584c29f6">previous blog post</a>, we explored how AI Assistant in Adobe Experience Platform is monitored and improved via an end-to-end evaluation framework, including how we track, categorize, and learn from errors in real-world usage.</p><p>This sequel expands on those ideas to address the challenges that arise when AI Assistant encounters <em>much</em> <em>larger, more varied</em> user traffic, as detailed in our research paper, <a href="https://ojs.aaai.org/index.php/AAAI/article/view/35161">Evaluation and Incident Prevention in an Enterprise AI Assistant</a>. We are thrilled to share that this latest work recently earned the prestigious <a href="https://aaai.org/conference/aaai/aaai-25/iaai-25-call/#:~:text=and%20smart%20manufacturing%E2%80%8B%E2%80%8B.-,DSRI%20AI%20Incidents%20and%20Best%20Practices%20Paper%20Award,-The%20DSRI%20AI">DSRI AI Incidents and Best Practices Paper Award</a> at the <a href="https://aaai.org/conference/aaai/aaai-25/">39th Annual AAAI Conference on Artificial Intelligence</a>. This recognition is a testament to our team’s commitment and engineering excellence in building enterprise-grade AI solutions that stand up to real-world complexity.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*0gXtdlavwVdvZ_kExj9cPg.png" /><figcaption><em>Some authors of the paper displaying the DSRI AI Incidents and Best Practices Paper Award won at the 39th Annual AAAI Conference on Artificial Intelligence.</em></figcaption></figure><h4><strong>Smarter annotation through coreset sampling</strong></h4><p>When we first launched AI Assistant, we attempted to label nearly every question to identify opportunities to improve. That became unsustainable as our customer base grew drastically, with users asking thousands of questions each month. We needed a way to preserve a complete picture of system performance without having to triple or quadruple our annotation staff.</p><p>Our answer: <strong>coreset-based sampling</strong>.</p><p>In simple terms, each query and its corresponding answer is embedded into a high-dimensional vector space. From there, we pick a “coreset” (or minimal subset) of queries that collectively cover the major patterns and edge cases in the data. Coreset sampling makes one important assumption — that the error rate we are interested in is a linear function of a (learnable) embedding. With this assumption, finding a minimal representative sample becomes a weighted discrepancy minimization problem. This means that we must find the minimal set of data points whose embedding vectors best approximate the “average” embedding of the dataset.</p><p>We solve this problem by applying an algorithm called <a href="https://arxiv.org/abs/1802.01737">Greedy Iterative Geodesic Ascent (GIGA)</a>. GIGA essentially looks at how well each additional data point covers unexplored regions of the embedding space. By iteratively adding the “most unique” query each round, GIGA ensures we capture all major user behaviors and tricky corner cases, but without an explosion in labeling costs.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*9FKluwFRL5kK9PG64IPZ4g.png" /><figcaption>Figure 3 from the Mean squared error of uniform (random) sampling and covariate aware sampling using GIGA. Error is measured with respect to proportion estimates obtained over the full set of annotations.</figcaption></figure><p>By comparing root mean squared error (RMSE) and other discrepancy metrics, we saw that coreset sampling outperforms random sampling. While a random sample might miss corner cases or over-represent redundant queries, coreset sampling selects fewer, more <em>informative</em> examples. This has freed us to devote expert annotator time to truly novel or complicated query/answer pairs.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*jBFcfePnCU7utBMhQBWNew.png" /><figcaption>Table 2 from the paper: Coreset size vs Unif size with percentage reduction in the number of samples needed for uniform sampling to reach the equivalent root mean squared error of the coreset based approach.</figcaption></figure><p>As a result, even with thousands of questions flowing in every month, we can discover critical issues quickly without missing rare but high-impact problems. This keeps AI Assistant’s performance consistent and avoids forcing customers to uncover obscure failures on their own. At the same time, annotation becomes more scalable, freeing resources for developing new features rather than drowning in labeling tasks.</p><h4><strong>Hunting down failures with adversarial testing</strong></h4><p>Enterprise users benefit from fewer surprises and higher reliability in our system. By proactively uncovering worst-case scenarios before anyone else, we protect customers from encountering these blind spots in day-to-day use.</p><p>Human annotation is crucial for broad monitoring, but there’s a second technique that has proven invaluable: <strong>adversarial testing</strong>. Instead of waiting for real users to stumble on subtle failures, we invite internal domain experts — people with specialized knowledge — to intentionally “break” AI Assistant. They craft questions designed to push every known weak spot: tricky domain jargon, contradictory instructions, or references to extremely specialized documentation.</p><p>Because experts pinpoint the root cause right away, we know if a mishap arises from a missing data source, a misconfigured retrieval pipeline, or a language model hallucination. That insight is fed directly back into engineering sprints and data improvements, so each high-risk bug can be addressed at the source.</p><p><strong>Preventing Regressions with Shared Evaluation Datasets</strong></p><p>We’re constantly rolling out new features and capabilities — sometimes every other week — to meet diverse customer needs. Multiple teams handle different components, and this level of rapid development can raise the risk of “feature regressions,” where one improvement inadvertently disrupts another function.</p><p>Our latest approach is <strong>shared evaluation datasets</strong>. At regular intervals (once a quarter), we gather and annotate a new batch of real production queries. This batch is then “locked in,” split into a development set (for component development or testing new ideas) and a <strong>holdout set</strong> that’s used strictly for final evaluations. If a team wants to introduce a change, they must show that the new code produces <em>at least as good</em> results on the holdout set as the current production baseline.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*aWJ-tHOxacVL___5FiSYwA.png" /><figcaption>Figure 4 from the paper: Creation of shared evaluation datasets on an ongo- ing basis, using sampling and human annotation of production traffic, which is then partitioned into development and holdout datasets.</figcaption></figure><h4><strong>Closing thoughts</strong></h4><p>We maintain a holistic view of interactions by monitoring how quickly users recover from mistakes, whether they receive clear explanations, and how effectively they complete their intended tasks. This bigger-picture lens drives user interface refinements and better conversation flows, ensuring the AI Assistant remains straightforward and transparent rather than misleading users with confident but incorrect answers.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*wFx0YvIX9LnvI-_-YSGMMQ.png" /><figcaption>Figure 5 from the paper: The continual improvement framework, emphasizing human annotation as a way of both generating labeled data to be used in shared evaluation datasets, and in driving measurement and error analysis. With the Error severity framework, we are then able to prioritize improved AI components, but also consider other improvements like UX changes that aid in verifiability, explainability, and enhancing user’s ability to recover.</figcaption></figure><p>Scaling up an AI Assistant is not just about spinning bigger servers or using more advanced models. It requires strategic, precise<strong> </strong>methods for monitoring and continuous improvement. We anticipate evolving these processes further as we tackle emerging challenges, like domain-specific compliance requirements and more advanced multimodal questions. Stay tuned for future updates where we dive deeper into how these evaluation and testing strategies equip AI Assistant to remain at the cutting edge of enterprise reliability.</p><p><strong><em>Authors: Akash V. Maharaj, David Arbour, Daniel Lee, Uttaran Bhattacharya, Anup Rao, Austin Zane, Avi Feller, Kun Qian, and Yunyao Li</em></strong></p><p><em>Namita Krishnan, Rini Iyju, Guang-jie Ren, and Huong Vu also contributed to this article.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=f45dda4b2783" width="1" height="1" alt=""><hr><p><a href="https://medium.com/adobetech/raising-the-bar-for-ai-assistant-in-adobe-experience-platform-f45dda4b2783">Raising the Bar for AI Assistant in Adobe Experience Platform</a> was originally published in <a href="https://medium.com/adobetech">Adobe Tech Blog</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[AI Assistant in Adobe Experience Platform: Evaluation and Continual Improvement]]></title>
            <link>https://medium.com/adobetech/ai-assistant-in-adobe-experience-platform-evaluation-and-continual-improvement-7cbc584c29f6?source=rss----9342990108af---4</link>
            <guid isPermaLink="false">https://medium.com/p/7cbc584c29f6</guid>
            <category><![CDATA[platform]]></category>
            <category><![CDATA[ai]]></category>
            <category><![CDATA[adobe-experience-platform]]></category>
            <category><![CDATA[ai-assistant]]></category>
            <category><![CDATA[generative-ai-tools]]></category>
            <dc:creator><![CDATA[Namita Krishnan]]></dc:creator>
            <pubDate>Thu, 06 Feb 2025 21:02:15 GMT</pubDate>
            <atom:updated>2025-02-06T21:02:14.937Z</atom:updated>
            <content:encoded><![CDATA[<p><a href="https://experienceleague.adobe.com/en/docs/experience-platform/ai-assistant/landing">AI Assistant in Adobe Experience Platform</a> represents a leap forward in building enterprise-grade applications in the Generative AI era. This article provides a behind-the-scenes account of how we approach evaluation and continual improvement as detailed in our research paper, <a href="https://aclanthology.org/2024.dash-1.3/"><em>Evaluation and Continual Improvement for an Enterprise AI Assistant.</em></a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*JqnMxFkJzzGGXelwB-seMA.jpeg" /><figcaption>Image credits: Adobe Stock</figcaption></figure><h4>Problems</h4><p>Enterprise users often face significant friction when trying to extract insights from their data. Conversational AI assistants, as illustrated in the figure below, promise to simplify this process, but delivering a reliable, precision-oriented enterprise-grade solution comes with unique challenges: fragmented data sources, evolving customer needs, and the risk of AI-generated errors that erode user trust.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/936/1*U8BS6W0D7VcO8aJmjqGDrw.png" /></figure><p>As we delved deeper into this project, we encountered a critical question: How do we effectively evaluate and improve an AI assistant that’s constantly evolving in a dynamic enterprise environment? This challenge is far from trivial. Enterprise AI assistants deal with sensitive customer data, need to adapt to shifting user bases, and must balance complex metrics while maintaining privacy and security. Traditional evaluation methods fall short in this context, often providing incomplete or misleading feedback.</p><h4>Our Approach</h4><p>To address these issues, we’ve developed a novel framework for evaluation and continual improvement. At its core is the observation that “not all errors are the same”. We have adopted a “severity-based” error taxonomy that aligns our metrics with real user experiences (see the table below):</p><ul><li>Severity 0 errors: These are the most insidious — answers that look correct but are wrong, potentially eroding user trust.</li><li>Severity 1 errors: Incorrect answers that users can’t recover from, leading to frustration.</li><li>Severity 2 errors: Errors that users can overcome through rephrasing, causing minor annoyance.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/936/1*uClzdHBOY2wMOoX0_531Xg.png" /></figure><p>This taxonomy allows us to prioritize improvements that have the most significant impact on user experience and trust. It’s part of a comprehensive approach that includes:</p><ul><li>Prioritizing metrics directly impacted by production changes</li><li>Efficient allocation of human evaluators</li><li>Collection of both end-to-end and component-wise metrics</li><li>System-wide improvements across all components</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/936/1*NLFONeuTWJyRhQay_Pf1Gw.png" /></figure><p>The impact of this framework on our customers has been substantial. By focusing on severity-based errors, we’re delivering more reliable and trustworthy AI assistance. Our human-centered approach ensures that improvements align with real user needs and pain points, as illustrated in the table below.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/736/1*vvT08qaicLeJWpd7gNKuSg.png" /></figure><h4>What’s Next</h4><p>We’re just getting started. Our focus now is on making AI Assistant in Adobe Experience Platform even more proactive, meeting the users in their natural workflow and expanding coverage. We’re also improving our evaluation framework along a few key dimensions:</p><p>1. Adding proactive evaluations over samples that are representative of production queries. This allows us to forecast the impact of new features and improvements on error rates.</p><p>2. Formalizing error-severity definitions by breaking down the subjective determinations into a series of less-subjective questions that a human annotator must answer. This has helped to improve the consistency of these error severity determinations.</p><p>3. Scaling evaluation with “LLM-as-judge” annotations– this is an extremely active area of research, and we are actively working on incorporating these methods, especially for tasks that do not require domain expertise to annotate.</p><p>To learn more about our work and the impact we’re seeing, read the full paper <a href="https://aclanthology.org/2024.dash-1.3/">here</a> and follow Adobe Experience Cloud on <a href="https://www.linkedin.com/showcase/adobe-experience-cloud/posts/?feedView=all">LinkedIn</a> for updates on our latest innovations.</p><p>Start using AI Assistant in Adobe Experience Platform today and supercharge the productivity of your marketing teams. AI Assistant is now available in Real-Time CDP, Journey Optimizer, and Customer Journey Analytics! For more details on getting access, visit the <a href="https://experienceleague.adobe.com/en/docs/experience-platform/ai-assistant/access">Access AI Assistant in Experience Platform</a> page.</p><h4>Authors</h4><p>Akash V. Maharaj, Kun Qian, Uttaran Bhattacharya, Sally Fang, Horia Galatanu, Manas Garg, Rachel Hanessian, Nishant Kapoor, Ken Russell, Shivakumar Vaithyanathan, and Yunyao Li</p><p>Guang-jie Ren, Huong Vu, and Namita Krishnan also contributed to this article.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7cbc584c29f6" width="1" height="1" alt=""><hr><p><a href="https://medium.com/adobetech/ai-assistant-in-adobe-experience-platform-evaluation-and-continual-improvement-7cbc584c29f6">AI Assistant in Adobe Experience Platform: Evaluation and Continual Improvement</a> was originally published in <a href="https://medium.com/adobetech">Adobe Tech Blog</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Security Blog Posts Are Moving to the New Adobe Security Blog]]></title>
            <link>https://medium.com/adobetech/important-update-were-moving-to-the-adobe-security-blog-d3176272b3a8?source=rss----9342990108af---4</link>
            <guid isPermaLink="false">https://medium.com/p/d3176272b3a8</guid>
            <category><![CDATA[security-blogging]]></category>
            <category><![CDATA[product-security]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[cloud-security]]></category>
            <dc:creator><![CDATA[Renae Kang]]></dc:creator>
            <pubDate>Tue, 21 Jan 2025 21:56:45 GMT</pubDate>
            <atom:updated>2025-02-04T15:30:56.341Z</atom:updated>
            <content:encoded><![CDATA[<h4>By the Adobe Security Team.</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*KBnqvk_o7EDlVjTnvsKcXA.png" /></figure><p>Hello, Medium Community!</p><p>We’re excited to announce that we are migrating our security blog to the <a href="https://blog.adobe.com/security/"><strong>Adobe Security Blog</strong></a>. To stay updated on the latest news, insights, and updates from the Adobe Security team, please make sure to bookmark our new home on the <a href="https://blog.adobe.com/security/"><strong>Adobe Security Blog</strong></a>.</p><p>We’d also love to hear from you! If you have any feedback or suggestions about our security content, feel free to share your thoughts via our<strong> </strong><a href="https://survey.adobe.com/jfe/form/SV_08TWfd3N5aWWNWS"><strong>blog survey</strong></a>.</p><p>This will be our final post on Medium, so we hope to see you over at the <a href="https://blog.adobe.com/security/"><strong>Adobe Security Blog</strong></a><strong> </strong>soon.</p><p>Thank you for your support!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d3176272b3a8" width="1" height="1" alt=""><hr><p><a href="https://medium.com/adobetech/important-update-were-moving-to-the-adobe-security-blog-d3176272b3a8">Security Blog Posts Are Moving to the New Adobe Security Blog</a> was originally published in <a href="https://medium.com/adobetech">Adobe Tech Blog</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Edge Delivery Services for Commerce: A New Storefront Has Dropped]]></title>
            <link>https://medium.com/adobetech/edge-delivery-services-for-commerce-a-new-storefront-has-dropped-ae1ac8d7ceca?source=rss----9342990108af---4</link>
            <guid isPermaLink="false">https://medium.com/p/ae1ac8d7ceca</guid>
            <category><![CDATA[aem-developer]]></category>
            <category><![CDATA[adobe-experience-cloud]]></category>
            <category><![CDATA[composable-commerce]]></category>
            <category><![CDATA[adobe-commerce]]></category>
            <category><![CDATA[edge-delivery-services]]></category>
            <dc:creator><![CDATA[Carlos A. Cabrera]]></dc:creator>
            <pubDate>Tue, 14 Jan 2025 19:05:34 GMT</pubDate>
            <atom:updated>2025-01-14T19:05:34.837Z</atom:updated>
            <content:encoded><![CDATA[<p>At Adobe, we have redefined the e-commerce storefront to help merchants streamline development workflows and accelerate time-to-market through a fully composable architecture powered by <a href="https://www.aem.live/">Edge Delivery Services</a> and our plug-and-play micro-frontends: <a href="https://experienceleague.adobe.com/developer/commerce/storefront/">Commerce Drop-in Components</a>.</p><p>The storefront has evolved dramatically over the past decade. From mobile-first to offline-first design to social media integrations and headless omnichannel experiences, businesses have faced challenges in efficiency, scalability, and ever-changing customer expectations. Traditional storefront solutions, often constrained by monolithic architectures rapidly becoming outdated, have faced challenges in keeping up with modern demands.</p><p>Once considered cutting-edge, single-page applications (SPAs) have fallen short with high adoption costs and a fragmented developer experience of gluing different tech stacks between content management systems and commerce platforms.</p><h3>Hello, composable storefront</h3><p>Developers like me live our day-to-day saturated with buzzwords and cheesy marketing phrases. We all roll our eyes at them. I know I do. But then, one day, you find yourself writing about “composable storefront.” Granted, the term can be considered another vague, trendy term for those unfamiliar. However, it also represents a shift in how e-commerce storefronts are designed and delivered. It advocates for reusable, interchangeable building blocks to create custom solutions. Their principles are rooted in practical architectural choices like micro-frontends, API-first design, and headless commerce.</p><p>Adobe Commerce drop-in components are full-featured, domain-specific shopping components designed for seamless integrations through predictable APIs. They include functional user interfaces for pages such as product details, shopping carts, checkout flows, user authentication, user accounts, and more.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*f8AlON9dCnR1p9XcfyzbyQ.png" /></figure><p>Drop-in components are released as modular JavaScript libraries via <strong>NPM</strong> following semantic versioning to ensure compatibility and stability. They are web framework agnostic and can be integrated into any website using standard JavaScript and CSS.</p><h3>Long live the content</h3><p>“Content is King”. It was true in 1996 when Bill Gates coined the term, and it’s still true today. In graphic design, content-first design prioritizes content when structuring and designing a website or application. Instead of shaping content around a pre-existing design, the design is created to support the content–you will rarely find conversion rate success in a storefront using a cookie-cutter design template selected at random. Businesses must understand their identity and build a tailored storefront that tells a story aligned with their brand and market perception. To make this possible, content must determine the technology and features, not vice versa.</p><p>The <a href="https://www.aem.live/docs/authoring">document-based authoring of AEM with Edge Delivery Services</a> goes beyond conventional content management by putting content at the center of the development cycle. A content block-driven approach in Edge Delivery Services provides content authors with a CMS that gets out of the way by removing complexities, empowering authors to create and deliver performant and personalized web pages to their users.</p><ul><li>Edge Delivery Services simplifies development by using vanilla JavaScript for customizations and integrations, eliminating the need for specialized frameworks or tooling, lowering the barrier for developers to contribute, reducing dependencies, and streamlining maintenance over time.</li><li>Content velocity is critical for businesses aiming to stay relevant and deliver dynamic user experiences. Document-based authoring plays nice with SharePoint and Google Drive documents, providing rapid content creation, editing, and deployment tools. Its intuitive interface allows content authors to focus on crafting engaging experiences without relying heavily on technical teams, fostering greater collaboration between marketers and developers. Additionally, content from Edge Delivery Services is <strong>reusable across channels</strong> and can be <a href="https://www.aem.live/developer/spreadsheets">delivered as HTML, Markdown, or JSON files</a>.</li><li>AEM with Edge Delivery Services prioritizes performance by optimizing content delivery. It ensures faster page loads and seamless interactions, even for dynamic and personalized experiences. Its capabilities allow businesses to serve lightweight, highly optimized pages that rank better in search engines and deliver superior user experiences.</li></ul><h3>Boilerplate from zero to shoppable</h3><p>To help developers hit the ground running, we built the <a href="https://github.com/hlxsites/aem-boilerplate-commerce">Edge Delivery Services for Commerce Boilerplate</a>. This comprehensive template focuses on function over form. It offers a pre-integrated and functional end-to-end storefront, allowing developers to run an unopinionated, plain-by-design storefront in minutes that they can use as ground zero for your project.</p><p>In e-commerce, storefronts are usually structured with core pages for the shopping experience. These pages support key actions in the shopping funnel, such as browsing products, managing the cart, and completing and following up on purchases. The Edge Delivery Services for Commerce Boilerplate is natively integrated with these core pages, where the author manages the sitemap, content, and page structure. Commerce Blocks are powered by Commerce drop-in components, enabling developers to meet their unique use cases by configuring and restructuring the composition layer as needed and even replacing specific containers with third-party or custom-built user interfaces.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*24DlKKKj7trpP56Maefu6A.png" /></figure><p>The Boilerplate is composed of the following drop-ins:</p><h4><a href="https://experienceleague.adobe.com/developer/commerce/storefront/dropins/user-auth/">Auth Drop-in Component</a></h4><p>Handles secure user authentication, including sign-ups, log-ins, password resets, and log-outs. It integrates seamlessly across the storefront to support all authentication views.</p><h4><a href="https://experienceleague.adobe.com/developer/commerce/storefront/dropins/product-details/">PDP Drop-in Component</a></h4><p>Powers the Product Details Page (PDP) by displaying comprehensive product details, such as descriptions, attributes, pricing, options, and images.</p><h4><a href="https://experienceleague.adobe.com/developer/commerce/storefront/dropins/cart/">Cart Drop-in Component</a></h4><p>Manages cart functionality, including viewing, updating, and merging carts. It supports mini-carts, pricing, estimated shipping/taxes, and order summaries. This drop-in integrates across multiple pages, including the PDP, Cart Page, and Checkout Page.</p><h4><a href="https://experienceleague.adobe.com/developer/commerce/storefront/dropins/checkout/">Checkout Drop-in Component</a></h4><p>Streamlines the purchase process with customizable controls for billing, shipping, payment methods, and order placement, powering the Checkout Page for a smooth transaction flow.</p><h4><a href="https://experienceleague.adobe.com/developer/commerce/storefront/dropins/order/">Orders Drop-in Component</a></h4><p>Provides post-purchase functionality such as order search, shipping status tracking, customer details, and returns. It integrates with Order Confirmation, Order Detail, and Guest Order Status Pages.</p><h4><a href="https://experienceleague.adobe.com/developer/commerce/storefront/dropins/user-account/">Account Drop-in Component</a></h4><p>Delivers account management capabilities, including customer details, addresses, payment methods, and order histories. It integrates with Account Pages to create a unified user profile experience.</p><p>The composable architecture of Edge Delivery Services combined with Commerce Drop-in Components provides developers with a solid foundation for building storefronts that scale. Whether enhancing the product pages, refining the checkout process, or delivering a custom account experience, the Boilerplate provides the essential tools to create custom experiences.</p><h3>Getting started</h3><p>To get started with the Edge Delivery Services for Commerce Boilerplate, follow the steps in the <a href="https://experienceleague.adobe.com/developer/commerce/storefront/get-started/">official documentation</a>.</p><p><em>Note: Adobe Commerce is highly customizable, with most customers using extensions. You can use the default Boilerplate’s Commerce environment as a playground. Still, to use your own Commerce instance, you must ensure all the necessary data is accessible via APIs for a headless integration. For more details about requirements, review the </em><a href="https://experienceleague.adobe.com/developer/commerce/storefront/discovery/architecture/"><em>Discovery and Preparation Blueprint documentation</em></a><em>.</em></p><p>Once you’ve set up the project, run npm install to install all dependencies, and npm dev to run your local development environment.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ZioT8HnzScPOi4QVxEQeyg.png" /></figure><p>At this point, you should see your brand-new storefront loaded on your favorite web browser. Go on, click around, explore, and buy something nice. As you have probably noticed, I wasn’t kidding when I said the Boilerplate was unopinionated and plain. It’s supposed to be underwhelming at first sight. Here is where you step in to transform this simple, unopinionated template into a brilliant storefront.</p><h3>Make it your own</h3><p>E-commerce sites share common characteristics but have unique identities shaped by their brand and target audience. Designing a customizable, run-time multi-tenant micro-frontend solution that is upgradable over time was a complex challenge the Adobe Commerce team had to solve.</p><p>We addressed this by building the drop-in components around consistent design patterns, resulting in a predictable development experience: learn one, and you can work with them all.</p><p>These conventions prioritize flexibility, scalability, and ease of customization, facilitating developers to build unique experiences without starting from scratch. By leveraging modular layouts, reusable containers, extensible slots, and streamlined data communication through the event bus, drop-in components balance standardization and the freedom to create.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*RBgDlrue44YhjU9K56mC1Q.png" /></figure><h3>Look and feel</h3><p>We designed every Commerce drop-in component using a standard base design system that consists of CSS tokens for colors, typography, spacing, shape styles, and a grid system.</p><p>Developers can customize the appearance of drop-in components by overriding or extending the built-in CSS classes. The DOM follows a consistent naming convention across all drop-in components, adhering to the <a href="https://getbem.com/">block-element-modifier (BEM)</a> methodology to enhance clarity, ensure predictability, and reduce the likelihood of style conflicts. Shared components used across multiple drop-in components (e.g., buttons, images) use the prefix “dropin,” following the format .dropin-&lt;component&gt;__element — modifier. On the other hand, drop-in-specific components are prefixed with the name of the drop-in component, such as .&lt;dropin-name&gt;-&lt;component&gt;__&lt;element&gt; — &lt;modifier&gt;. For example, the .dropin-button class applies styles to all buttons across the storefront, while the .auth-sign-in-form styles apply the sign-in form from the authentication drop-in component.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*9Crm_HFiFvsYx-n0589IdQ.png" /></figure><h3>Restructuring layouts</h3><p>In Edge Delivery Services, <a href="https://www.aem.live/docs/authoring">authors manage pages directly from the content source</a>, including headings, images, videos, links, sections, and blocks. Blocks provide authors with pre-built, structured UI components, enabling them to design pages with sections that serve different functionalities — for example, heading blocks, hero blocks, product recommendation blocks, tiles blocks, etc.</p><p>We pre-integrated Commerce drop-in components into these blocks, which are readily available in the Boilerplate. For instance, in the Boilerplate environment, the PDP (Product Detail Page) is authored in products/default.docx and includes the following blocks:</p><ol><li><strong>Product Details</strong></li><li><strong>Content Enrichment</strong></li><li><strong>Product Recommendations</strong></li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*AC458S3IbJ4RhCm8k1kVeQ.png" /></figure><p>In the image above, each block (represented as a table) corresponds to a folder within the ./blocks/ directory, with folder names written in kebab-case (converting spaces and capitalization into lowercase and hyphens). For example, the “Product Details” block referenced in the table is in the ./blocks/product-details/ <a href="https://github.com/hlxsites/aem-boilerplate-commerce/tree/develop/blocks/product-details">directory</a>. Each block directory contains two required files matching its name:</p><ul><li>A CSS file for the block’s unique styles: ./blocks/product-details/product-details.css</li><li>A JavaScript file that transforms the block’s markup into the necessary HTML structure: ./blocks/product-details/product-details.js</li></ul><p>The <strong>Product Details</strong> block encapsulates the entire PDP layout. These layouts are fully composable, customizable, and styled based on their respective CSS and JavaScript files. If needed, developers can re-arrange and style all template sections and replace pre-built components with custom UI.</p><h3>Containers</h3><p>Drop-in components leverage Containers as modular UI views that structure sections within the layout. Each container delivers domain-specific Commerce functionality to the storefront, enabling flexible composition and customization. In the case of the PDP, there are Containers for each section of the layout, including the gallery, price, product description, configuration options, and more. This structure ensures that each section operates as an independent, composable unit while adhering to the overarching layout.</p><p>By breaking the layout into containers, developers can modify individual sections without affecting the design. For example, you can replace the gallery container with a custom image carousel or extend the product configuration container to include new options.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*kijgFgcPy2_JRnFopa5u5A.png" /></figure><h3>Customizing Containers with Slots</h3><p>Developers can perform granular customizations to the layout using predefined <a href="https://experienceleague.adobe.com/developer/commerce/storefront/dropins/all/extending/">slot extension points</a> within drop-in containers. These slots provide API methods and, in some cases, extra context data to inject custom HTML elements into specific areas of the UI without rebuilding the entire UI.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*SGtcFoR3-U7CLgPPZUH1Xg.png" /></figure><p>For example, in the product details page (PDP) drop-in component, the <strong>ProductOption</strong> container includes a slot named <strong>Swatches</strong>. Developers can utilize this slot to add a “<strong>Size Chart</strong>” link below the product size options.</p><pre>pdpRenderer.render(ProductOptions, {<br>  slots: {<br>    Swatches(ctx) {<br>      // get slot element for &quot;size&quot; attribute<br>      const size = ctx.getSlotElement(&#39;product-swatch - size&#39;);<br>      // add link to Sizes<br>      if (size) {<br>        // create link<br>        const link = document.createElement(&#39;a&#39;);<br>        link.textContent = &#39;Size Chart&#39;;<br>        // set link href to size chart page with product SKU<br>        link.href = `/size-chart?product=${ctx.data.sku}`;<br>        // append link go size<br>        size.appendChild(link);<br>      }<br>    },<br>  },<br>})($options);</pre><p>In this script, the Swatches slot is accessed through its API, enabling the dynamic addition of a “Size Chart” link tailored to the product’s SKU. This approach empowers developers to enrich the user interface precisely where needed, offering additional functionality while maintaining a reusable and upgradable codebase.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Z5JvZ7kHW5sZa6x4B13ttg.png" /></figure><h3>Data synchronization across drop-in components</h3><p>Drop-in components are micro-frontends housed in independent and interchangeable containers, but how do they communicate effectively? Creating a seamless user experience from modular components requires robust data synchronization. To ensure that all drop-in components, regardless of their specific functionality, remain synchronized with each other and the overall storefront, we created a centralized event bus that facilitates real-time communication and state management.</p><p>For instance, when a user selects an option on the PDP, an event containing the updated product data is emitted to the event bus. Other containers on the PDP that are subscribed to this event are automatically updated to reflect the new information. Similarly, when the user adds the product to their cart, the cart drop-in component instantly updates by subscribing to the relevant cart data event. Drop-in components are interconnected via the event bus by design, enabling developers to subscribe to these events and leverage data changes to create custom features and enhancements.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*WK1dcVovFpoQPNT_fwnxsQ.png" /></figure><h3>The case for server-side rendering</h3><p>Delivering fast, accessible, high-quality content is non-negotiable in e-commerce. Although we build websites for humans, some web crawlers have limited support for client-side rendering, which can impact SEO and the discoverability of product pages.</p><p>Product Detail Pages (PDPs) in Edge Delivery Services for Commerce rely on folder-mapped pages — virtual pages created dynamically. A template page is used for all PDP paths requested, i.e., /products/* Essential metadata, including the title, description, keywords, OpenGraph tags, and JSON-LD product schema, is rendered server-side to ensure optimal compatibility with social media sharing while the rest of the page loads client-side for dynamic functionality.</p><p>To improve SEO and deliver pages faster to users, Edge Delivery Services employs a serverless function to monitor product updates in Catalog Service. When detecting changes on a product, this function triggers the Edge Delivery Services preview API, which generates a fresh, static HTML version of the product page using the “bring-your-own-markup” render service. This system ensures that templates align with your functionality needs. This hybrid approach ensures that pages are fast, up-to-date, and optimized for users and search engines.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*7ITAVudn77Me1iw0znrV-A.png" /></figure><h3>The storefront journey has only just begun</h3><p>We have reimagined what a modern e-commerce storefront can be, and the Edge Delivery Services for Commerce Boilerplate manifests this vision. It offers developers a streamlined, composable foundation to create high-performance storefronts while addressing the inefficiencies of traditional architectures and bridging the gaps between content management and the commerce platform.</p><p>We are just scratching the surface of what’s possible, unlocking a future where every storefront is as dynamic, scalable, and unique as the businesses it represents. <a href="https://experienceleague.adobe.com/developer/commerce/storefront/">Give it a try</a> and join us in rethinking the modern storefront developer experience. Have questions or want to connect with others? <a href="https://discordapp.com/channels/1131492224371277874/1220042081209421945">Join our Discord channel</a> and be part of the conversation.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ae1ac8d7ceca" width="1" height="1" alt=""><hr><p><a href="https://medium.com/adobetech/edge-delivery-services-for-commerce-a-new-storefront-has-dropped-ae1ac8d7ceca">Edge Delivery Services for Commerce: A New Storefront Has Dropped</a> was originally published in <a href="https://medium.com/adobetech">Adobe Tech Blog</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Behind the Scenes with Ammar Alim, DevSecOps Leader]]></title>
            <link>https://medium.com/adobetech/behind-the-scenes-with-ammar-alim-devsecops-leader-3a237b760a6d?source=rss----9342990108af---4</link>
            <guid isPermaLink="false">https://medium.com/p/3a237b760a6d</guid>
            <category><![CDATA[devsecops]]></category>
            <category><![CDATA[cloud-security]]></category>
            <category><![CDATA[security-culture]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[product-security]]></category>
            <dc:creator><![CDATA[Renae Kang]]></dc:creator>
            <pubDate>Thu, 05 Dec 2024 17:43:06 GMT</pubDate>
            <atom:updated>2024-12-05T17:43:52.747Z</atom:updated>
            <content:encoded><![CDATA[<h4>By <a href="mailto:https://www.linkedin.com/in/ammar-alim-6630a977/">Ammar Alim</a>, Senior Manager, DevSecOps</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*VyCjLFPyEkZsuKtflim4yg.png" /></figure><p>Adobe’s DevSecOps team creates innovative solutions that seamlessly integrates application and infrastructure security into Agile and DevOps workflows. By embedding security into these solutions from the earliest stages of development, Adobe’s engineering teams can address security issues easier, faster, and at less expense before they reach production. Ensuring that Adobe bakes security into the DNA of its products at conception takes someone with a special interest in technology. It takes someone like Ammar Alim, senior manager of Adobe Security’s DevSecOps team whose passion for technology is rooted in a deep family history that has shaped his journey.</p><p>Join us as we take you <em>Behind the Scenes (BTS) </em>and introduce you to Ammar and how he puts his technology upbringing to work at Adobe.</p><h3><strong>Tell us about your career journey and background. What initially got you interested in cybersecurity?</strong></h3><p>My connection to technology wasn’t born from video games or childhood programming; To me, computers and technology have always been powerful tools for changing and improving lives. This understanding, passed down from my family experiences, has profoundly shaped my view of technology and has been a driving force in my career path.</p><p>My parents were born in villages along the Nile Valley, just south of the Great Pyramid of Giza. They were the first in their families to attend college where they met, breaking away from a long farming tradition that began in 3000 BC, according to historians. Most of my relatives still operate farms, but my parents took a different route, influenced by the opportunities that education and technology could provide.</p><p>My father moved to Saudi Arabia after college where he took a job with a foreign company that introduced him to computers. Eager to learn, he immersed himself in absorb everything he could, eventually buying a Commodore 64 — one of the first home computers available — and taught himself how to program in the C language. He soon began to believe in the importance of computer literacy skills for everyone, so he inspired my mother to learn about computers after she lost out on a job due to her lack of computer skills.</p><p>When my father passed away while I was still young, my mother needed to find work to support our family. At the time, women weren’t allowed to work in Saudi Arabia, and opportunities were limited for educated women in Egypt. However, my mother used her technology skills to communicate with international organizations and eventually secured a job with the United Nations.</p><p>Building upon my parents’ own experiences, I took a part-time tech job in my second year of college, which eventually turned into a full-time role after graduation. This job introduced me to a manager who played a pivotal role in shaping my career. He led the application security team, overseeing vulnerability management, penetration testing, and other key functions. As I attended staff meetings, I became increasingly fascinated by security as engineers shared updates on their security projects.</p><p>I became particularly interested in cloud security as our company was migrating to the cloud. It quickly became clear that securing cloud environments posed a significant challenge due to a shortage of expertise in the field. With the public cloud on the horizon, I saw an opportunity to enter an emerging field, contribute to the team, and advance my career.</p><p>At the time, I had no prior cloud experience, so I committed several months of studying to achieve AWS certifications and attended an AWS conference in Chicago to learn more. Shortly after, I officially joined the Cloud team and transitioned to working full-time on cloud security automation.</p><p>A year later, I had established myself as a cloud security engineer, and as demand for cloud security professionals surged in this rapidly growing field, I began receiving job offers. One offer stood out — a chance to move to Seattle and join a dedicated cloud security team, which I couldn’t pass up. It wasn’t just a dream job; it was the realization of a personal goal to live in Seattle, a city I had always been drawn to, both for its tech scene and its mountain climbing scene.</p><p>I later had the opportunity to lead Cloud &amp; Infrastructure Security at Frame.io, a fast-growing post-production startup that offered immense growth and learning opportunities. After Adobe’s acquisition of Frame.io in 2021, my team eventually transitioned to leading DevSecOps at Adobe.</p><h3><strong>What do you enjoy most about your current role?</strong></h3><p>As the leader of Adobe’s DevSecOps team, I oversee a talented group of engineers focused on empowering product teams to ship “software, safer, sooner” — our DevSecOps motto — by creating seamless integrations that boost developer productivity.</p><p>Our team drives two key security initiatives. First, we leverage fuzz testing, a powerful security testing technique, to ensure Adobe applications, including flagship products like Photoshop, meet the highest security standards. Second, we provide Web Application Protection, using advanced tools such as cloud-native and next-gen web application firewalls to defend against emerging threats, including zero-day vulnerabilities. We also focus on enabling fast response to attacks like DDoS, making sure our products remain secure and reliable under attacks.</p><p>What I enjoy most about working with my team is tackling complex security challenges. I love seeing how the team grows with each project. There’s often a sense of confusion and anxiety at the start of a big project, but I’ve come to see it as a positive sign; it means we’re working on something important and challenging. Over time, I’ve watched the team transform rough ideas into well-developed solutions, experimenting, refining, and improving with each step.</p><p>As a manager, there’s nothing more satisfying than seeing my team overcome tough challenges, take risks, and push through difficult moments to complete a project. These experiences create strong bonds and a sense of unity, which makes the work even more fulfilling.</p><h3><strong>What is your favorite part about working at Adobe?</strong></h3><p>What I appreciate most about Adobe is the abundance of opportunities given to contribute to something greater and make a real difference in people’s lives through technology. As tech workers, we sometimes forget how much our work can impact real people’s lives, but then I think of someone like my neighbor– a photographer and a single mother of two. For her, Photoshop isn’t just a tool; it’s her livelihood. Working at Adobe, I support the technology that enables her and countless others to pursue their passions and provide for their families. Knowing that what we do directly helps people like her is what makes my work truly meaningful.</p><p>Adobe also prioritizes the well-being of its employees, consistently demonstrating care whether through crisis support, mental health resources, or flexible work options. This commitment fosters a culture where people feel valued, which is why I’m proud to work here.</p><h3><strong>What is one piece of advice you would give to someone interested in pursuing a career in cybersecurity?</strong></h3><p>I advise anyone getting into cloud security to build a solid foundation in IT basics like networking, infrastructure, and programming. You don’t need to be an expert in everything, but having a well-rounded understanding will help you adapt to new challenges. Versatility is critical in security because it lets you see the bigger picture and contribute more effectively.</p><p>Another piece of advice is to stay mindful of how your role fits into the broader context of business and society. It’s easy to get lost in the technical details, but stepping back to understand how your work impacts the company, the industry, and even society as whole will give you a valuable perspective. It helps you improve your work, connect to a larger purpose, and make a more meaningful impact.</p><h3><strong>Finally, what is one thing people would be surprised to know about you?</strong></h3><p>Growing up across three continents and speaking four languages, I’ve always been fascinated by different cultures. As a child, living in foreign countries often made me feel like I didn’t quite belong. To fit in, I often embraced local customs, including wearing traditional clothing. This began when I was three years old and living in Saudi Arabia. I didn’t fully understand the significance at that age, but I begged my parents to buy me a Ghutra (traditional white headscarf) and an agal (the black cord worn over it), wanting to wear what I saw around me.</p><p>What started as a way to fit in gradually evolved into something more meaningful. As I moved to different countries, my interest in traditional clothing grew into a deeper appreciation for the diverse cultures I experienced. Today, I have a collection of traditional garments from the places I’ve lived or visited, each one a reminder of those unique experiences and memories. Over time, this collection has come to symbolize my respect for the diversity of cultures that have shaped who I am.</p><p>This global perspective has also influenced how I work. Whether learning new technologies or navigating diverse team dynamics, adaptability and understanding different perspectives have become invaluable assets to me. With Adobe planning to open a new regional headquarters in Riyadh, Saudi Arabia in the next year, I’m thinking it may be time to pay a visit in the new office, proudly wearing a traditional<em> Thobe</em>…</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/862/1*ieS38wlUcCU6zvT8SIAFyg.png" /></figure><h3>What’s on Your Mind? We Want to Hear from You!</h3><p>Your opinion matters to us. Help shape the future of our blog by sharing your ideas and preferences. Click the link below to take a quick survey and tell us what you’d like to read about next.</p><p><a href="https://survey.adobe.com/jfe/form/SV_08TWfd3N5aWWNWS"><strong>&gt; Take the Security@Adobe Tech Blog Survey</strong></a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3a237b760a6d" width="1" height="1" alt=""><hr><p><a href="https://medium.com/adobetech/behind-the-scenes-with-ammar-alim-devsecops-leader-3a237b760a6d">Behind the Scenes with Ammar Alim, DevSecOps Leader</a> was originally published in <a href="https://medium.com/adobetech">Adobe Tech Blog</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Important Cross-Origin Isolation Update for Adobe Express Add-on Developers]]></title>
            <link>https://medium.com/adobetech/important-cross-origin-isolation-update-for-adobe-express-add-on-developers-8404940e4d43?source=rss----9342990108af---4</link>
            <guid isPermaLink="false">https://medium.com/p/8404940e4d43</guid>
            <category><![CDATA[developer]]></category>
            <category><![CDATA[cross-origin-isolation]]></category>
            <category><![CDATA[adobe-express]]></category>
            <category><![CDATA[addons]]></category>
            <category><![CDATA[adobe-creative-cloud]]></category>
            <dc:creator><![CDATA[Kerri Shotts]]></dc:creator>
            <pubDate>Fri, 08 Nov 2024 21:57:57 GMT</pubDate>
            <atom:updated>2025-01-28T22:28:30.478Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*PsAIksivYIiDbRyisLx3yg.jpeg" /><figcaption>Important updates for Adobe Express add-on developers. (Image generated by Adobe Firefly)</figcaption></figure><p><strong>Adobe Express will soon enforce cross-origin isolation for Chromium-based browsers</strong> (including Chrome, Microsoft Edge, Opera, and others). This change may negatively impact your add-on’s functionality due to stricter rules enforced by the browser. You’ll want to ensure that any add-ons you’ve developed or are building now work in this new environment.</p><p><strong>Note: </strong>We expect the enforcement of cross-origin isolation headers to begin around the end of 2024. We’ll provide an update here and in our documentation the moment we have a more certain date.</p><p><strong>Update as of January 2025: </strong><em>We expect Adobe Express to begin enforcing the new cross-origin headers within the next month or so. Developers of impacted add-ons should submit new versions of their add-on by February 15, 2025 to ensure sufficient time for the review process to complete. Add-ons that fail to work after Adobe Express enforces these headers may be removed.</em></p><h3>Impact</h3><p>This change may impact your add-on’s access to external resources, especially if your add-on relies on iframes to display content or support payment flows. This could also impact add-ons that make fetch calls or display images from external sources. If your external source is not properly configured, users may see missing content or may encounter silent failures if your add-on can’t load a remote resource. Since this results in a poor experience, developers must ensure that their add-ons work in this new environment.</p><p>Currently, this change only impacts Chromium-based browsers (e.g., Chrome, Edge, Opera, etc.). This change also applies to add-ons running on Android devices if you’ve developed a mobile add-on. Firefox and Safari browsers are not impacted.</p><p><strong>Note:</strong> This affects <em>all</em> add-ons even if they aren’t published in the add-on marketplace. This includes both private and internally distributed add-ons.</p><h4>Types of Failures</h4><p>Some failures will be more obvious than others, but all can negatively impact the user experience of your add-on.</p><ul><li>If a nested iframe fails to load, Chrome and Chromium-based browsers display a very obvious error message inside the iframe indicating that the domain “refused to connect”.</li><li>If an image fails to load, you may notice missing images in your add-on’s user interface. You should also see failures in the Network section of the browser’s developer tools.</li><li>If a network call fails due to JavaScript code, you should see warning and error messages in the browser’s developer tools.</li></ul><h3>Test your add-on</h3><p>Until Adobe Express enables these headers by default, you can verify that your add-on will function correctly by applying local header overrides. We’ve provided<a href="https://developer.adobe.com/express/add-ons/docs/guides/develop/coi/#testing-your-add-on"> full instructions on simulating these headers in our developer documentation</a>.</p><h4>What should you test?</h4><p>While most add-ons are likely to be unaffected by this change, you should double-check any flows that access external content or embed resources from other domains in your add-on’s user interface. This includes purchase flows, loading external content in iframes, displaying assets from external domains, and adding content to the user’s document that originates from an external domain.</p><p><a href="https://developer.adobe.com/express/add-ons/docs/guides/develop/coi/#what-to-test-in-your-add-on">Check out the documentation for more detail.</a></p><h3>Addressing issues found in your add-on</h3><p>If you do encounter issues in your add-on related to cross-origin isolation, these are generally easy to address. You should check your add-on as soon as possible however—if you rely on a third-party service, you may have to do more work to address any cross-origin isolation issues.</p><p><a href="https://developer.adobe.com/express/add-ons/docs/guides/develop/coi/#addressing-issues-found-in-your-add-on">Read our documentation for more detail on fixing issues.</a></p><h3>Next Steps</h3><p>You should <a href="https://developer.adobe.com/express/add-ons/docs/guides/develop/coi/">review the documentation</a> for complete details about cross-origin isolation which includes steps on setting up your local environment for testing. You should also <a href="https://developer.adobe.com/express/add-ons/docs/references/changelog/">keep an eye on the changelog</a> as the documentation will be updated over time.</p><p>While we expect that the majority of add-ons are <em>not </em>impacted or affected, we are performing smoke tests for currently published add-ons to double-check. If we encounter any add-ons with failures, we’ll reach out to the developers of the affected add-ons. <strong><em>However, it is wise for all add-on developers to test their add-ons since they know their add-on inside and out.</em></strong></p><p>All new add-ons published to the marketplace will be reviewed with these headers in place. If the reviewer finds a problem with your submission related to cross-origin isolation that impacts the usability of your add-on, the reviewer will reject your add-on.</p><p>If you have issues testing your add-on or addressing any issues relating to this change, <a href="https://developer.adobe.com/express/community">don’t hesitate to let us know</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8404940e4d43" width="1" height="1" alt=""><hr><p><a href="https://medium.com/adobetech/important-cross-origin-isolation-update-for-adobe-express-add-on-developers-8404940e4d43">Important Cross-Origin Isolation Update for Adobe Express Add-on Developers</a> was originally published in <a href="https://medium.com/adobetech">Adobe Tech Blog</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Proofs of Concept: A Proactive Approach for Hypothesis-Driven Threat Hunting]]></title>
            <link>https://medium.com/adobetech/proofs-of-concept-a-proactive-approach-for-hypothesis-driven-threat-hunting-b35678caf403?source=rss----9342990108af---4</link>
            <guid isPermaLink="false">https://medium.com/p/b35678caf403</guid>
            <category><![CDATA[threat-hunting]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[proof-of-concept]]></category>
            <category><![CDATA[detection-and-response]]></category>
            <category><![CDATA[hypothesis-testing]]></category>
            <dc:creator><![CDATA[Renae Kang]]></dc:creator>
            <pubDate>Wed, 23 Oct 2024 19:33:52 GMT</pubDate>
            <atom:updated>2024-10-23T19:33:34.085Z</atom:updated>
            <content:encoded><![CDATA[<h4>By <a href="https://www.linkedin.com/in/adrian-bondocea-864006103/">Adrian Bondocea</a>, Senior Cyber Threat Hunter &amp; <a href="https://www.linkedin.com/in/marius-m-8a3ab9146/">Marius Manica</a>, Manager, EMEA Computer Security Incident Response Team (CSIRT)</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/672/1*GTcz4tgemMQ9p_J5XuQTLg.jpeg" /><figcaption>Generated with <a href="https://www.adobe.com/products/firefly.html">Adobe Firefly</a>.</figcaption></figure><p>In today’s evolving threat landscape, traditional reactive approaches to cybersecurity are no longer enough to protect organizations from sophisticated attacks. <a href="https://blog.developer.adobe.com/building-our-security-coordination-center-scc-hunting-program-123ec9b2dd1e">Threat hunting</a> fills this gap with a proactive, methodical strategy for uncovering threats that evade automated defenses.</p><p>At the heart of effective threat hunting is <em>hypothesis testing</em> — the practice of developing informed assumptions about potential threats and systematically investigating them. A powerful tool in this process is the <strong><em>Proof of Concept (POC)</em></strong>, which helps validate hypotheses, simulate attack scenarios, and refine detection mechanisms. By leveraging POCs, organizations can test their assumptions in controlled environments, enhancing their detection capabilities and mitigating potential threats.</p><p>In this blog, we’ll discuss how Adobe Security’s threat hunting team employs strategies such as hypothesis testing and POCs to strengthen our detection capabilities and proactively defend against evolving threats.</p><h3><strong>Defensive vs. Offensive Approaches in Threat Hunting</strong></h3><p>In threat hunting, there are two primary approaches: defensive and offensive.</p><p><strong>Defensive Approach</strong></p><p>In a defensive approach to threat hunting, proactive hunting plays a critical role. Rather than waiting for alerts or known incidents, threat hunters actively search their systems, networks, and logs for traces of malicious activity, with a goal of identifying Indicators of Compromise (IoCs) or Tactics, Techniques, and Procedures (TTPs) described in threat intelligence reports.</p><p>Additionally, threat hunters use behavioral patterns and anomalies from these reports to detect signs of advanced or stealthy threats that may bypass traditional signature-based detection systems. This proactive strategy enables hunters to identify latent threats that may exist within the environment without triggering automated alerts, ensuring a more comprehensive and preemptive defense against potential attacks.</p><p><strong>Offensive Approach</strong></p><p>In an offensive approach to threat hunting, the hunter takes on the mindset and tactics of an attacker to simulate real-world cyber threats. This involves using the same Tactics, Techniques, and Procedures (TTPs), as well as tools commonly employed by attackers. Threat hunters may also develop custom tools that don’t yet have detection signatures, enabling them to emulate more sophisticated or novel attacks.</p><p>By mimicking an attacker’s steps to target the organization’s internal infrastructure, threat hunters can generate valuable artifacts, such as logs or traces of malicious activity, which help security teams identify similar actions in the future and detect actual attacks early. This process also helps uncover gaps in existing detection systems or logging mechanisms, enabling teams to strengthen defenses and improve overall security monitoring.</p><p>Weighing these two approaches, Adobe’s threat hunting program integrates both strategies into a comprehensive framework. Traditional reactive defensive methods often fall short against modern adversaries, so we incorporated a range of offensive techniques during our testing phase that mimic the tactics a malicious actor might employ. This strategy allows us not only to validate hypotheses but also to produce the artifacts necessary for developing logic behind potential detection rules.</p><h3><strong>Understanding Hypothesis-Driven Threat Hunting</strong></h3><p>Threat hunting is often driven by hypotheses — educated guesses based on known attack patterns, anomalies, or intelligence that suggest the presence of a threat. Rather than waiting for threat alerts to trigger, threat hunters proactively search for indicators of compromise (IOCs) or suspicious activities within their networks. A hypothesis can stem from various sources, including recent threat intelligence reports, unusual network behavior, known vulnerabilities within the organization’s environment, or legitimate software that may be exploited for malicious purposes.</p><p>For instance, a hypothesis might suggest the presence of a specific type of malware targeting specific assets or data within a system. By leveraging such hypotheses, Adobe has not only identified novel techniques but also uncovered critical vulnerabilities that emerged during the testing process.</p><h3><strong>Why Proofs of Concept Are Essential</strong></h3><p>In the context of threat hunting, POC involves creating a controlled, often isolated environment to test a hypothesis by simulating a potential threat scenario, observing its behavior, and assessing whether it can be detected and mitigated. Running a POC allows threat hunters to transition from theoretical assumptions to concrete evidence, enabling them to refine their detection and response strategies.</p><p>This process offers several defensive advantages, including generating valuable indicators, validating existing detection rules, creating high-fidelity detection rules, identifying visibility gaps, and, in some cases, facilitating the capture of attackers.</p><p>POCs are essential in threat hunting for the following reasons:</p><ul><li><strong>Validation of Hypotheses</strong>: POCs provide a structured way to test hypotheses, allowing organizations to verify whether a suspected threat is real or benign. This reduces the chances of false positives and helps to focus resources on real threats.</li><li><strong>Enhanced Detection Capabilities</strong>: POCs observe the behavior of a simulated threat in a testing environment, allowing threat hunters to refine their detection techniques by adjusting alert thresholds, fine-tuning detection rules, or developing new monitoring strategies.</li><li><strong>Risk Reduction</strong>: Organizations can observe potential threats in a controlled environment through POCs, allowing for safe experimentation with various scenarios and responses while minimizing risk to the broader network.</li><li><strong>Improved Incident Response</strong>: POCs provide insights during testing that directly inform incident response strategies, enabling organizations to understand how threats manifest and spread, which help drive more effective containment and remediation plans.</li><li><strong>Knowledge Transfer and Skill Development</strong>: POCs help upskill threat hunting teams by offering hands-on experience with real-world scenarios, improving their understanding of the nuances of threat detection and response.</li><li><strong>Tool Validation</strong>: POCs enable the evaluation of tools within the security stack and assess their capabilities.</li><li><strong>Visibility Gaps</strong>: POCs help identify instances where threat hunters may encounter gaps in log sources, logging capabilities, and coverage while implementing techniques to validate hypotheses.</li></ul><h3><strong>Wrap Up</strong></h3><p>Integrating POCs into threat-hunting efforts is not just a best practice; it has become essential in today’s complex threat landscape. By validating hypotheses through meticulously designed assessments, POCs can enhance detection capabilities, minimize the risk of false positives, and strengthen an organization’s overall cybersecurity posture. As threats continue to evolve, the ability to test and refine our defenses through POCs will be a critical differentiator in staying ahead of potential attackers.</p><h3>What’s on Your Mind? We Want to Hear from You!</h3><p>Your opinion matters to us. Help shape the future of our blog by sharing your ideas and preferences. Click the link below to take a quick survey and tell us what you’d like to read about next.</p><p><a href="https://survey.adobe.com/jfe/form/SV_08TWfd3N5aWWNWS"><strong>&gt; Take the Security@Adobe Tech Blog Survey</strong></a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=b35678caf403" width="1" height="1" alt=""><hr><p><a href="https://medium.com/adobetech/proofs-of-concept-a-proactive-approach-for-hypothesis-driven-threat-hunting-b35678caf403">Proofs of Concept: A Proactive Approach for Hypothesis-Driven Threat Hunting</a> was originally published in <a href="https://medium.com/adobetech">Adobe Tech Blog</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Updates for Creative Cloud Desktop Extensibility]]></title>
            <link>https://medium.com/adobetech/updates-for-creative-cloud-desktop-extensibility-0dd5c663563e?source=rss----9342990108af---4</link>
            <guid isPermaLink="false">https://medium.com/p/0dd5c663563e</guid>
            <category><![CDATA[extensibility]]></category>
            <category><![CDATA[adobe-creative-cloud]]></category>
            <category><![CDATA[plugins]]></category>
            <category><![CDATA[cep]]></category>
            <category><![CDATA[uxp]]></category>
            <dc:creator><![CDATA[Padma Krishnamoorthy]]></dc:creator>
            <pubDate>Fri, 18 Oct 2024 22:05:06 GMT</pubDate>
            <atom:updated>2024-11-12T16:25:19.083Z</atom:updated>
            <content:encoded><![CDATA[<h4>The latest info for anyone who has built CEP Extensions or UXP plugins or has hosted their work in Adobe Marketplace.</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*o1mYE9VVFLJk8k27juic2w.png" /></figure><h3>Unified eXtensibility Platform (UXP)</h3><p>We recently released UXP v8.0 in Photoshop 2025 (v26) and InDesign v20.0 with key features mentioned below:</p><ul><li>Support for <strong>new Spectrum Web Components</strong> to provide a wholesome UI library that aligns with Adobe’s Design Language — Spectrum</li><li>The much-awaited <strong>local HTML support for Webview</strong>. Webviews are particularly helpful for features that are not innately supported in UXP, such as animation, 3D APIs, etc. By allowing local HTML files, we are reducing the overhead of hosting the HTML files in a remote server and allowing you to provide complete functionality within the UXP plugin package.</li><li>Enhancement to Video, HTMLElement, and HTMLForm APIs to match the web APIs.</li></ul><p>Photoshop and InDesign have new DOM APIs, too.</p><h4><strong>This year, Photoshop did the following:</strong></h4><ul><li>Introduced the ability to record a function call inside a UXP plugin as an Action step.</li><li>Allowed the access to Photoshop C++ SDK from UXP Hybrid Plugins.</li><li>Added improvements to help avoid request collisions when using executeAsModal.</li></ul><p><a href="https://developer.adobe.com/photoshop/uxp/2022/ps_reference/changelog/">Discover more details about the APIs in Photoshop</a>.</p><h4><strong>InDesign v20.0 includes the following:</strong></h4><ul><li>Capability to persist storage for plugin data to carry over plugin data from one version of InDesign to the next. By selecting the ‘Import Previous Settings and Preferences’ option during plugin installation, the users’s plugin data is preserved when upgrading to the newer version of InDesign.</li><li>Support Flyout menu — Now you can invoke operations directly from the hamburger icon at the top right of your plugin panel, without taking up any real estate.</li><li>Support for UXP GUID APIs.</li></ul><p><a href="https://developer.adobe.com/indesign/uxp/changelog/">Discover more details about the APIs in InDesign</a>.</p><h4><strong>Adobe XD</strong></h4><p>As a reminder, please note that on November 15th, 2024, we will stop accepting <em>new</em> plugins for Adobe XD in our Marketplace. Existing published plugins can continue to be managed and updated via the Developer Distribution portal. The UXP Developer Tool (UDT) will continue to support plugin development. Visit the <a href="https://developer.adobe.com/xd/uxp/faq/">FAQs</a> page for more details.</p><h4>Premiere Pro and Adobe Media Encoder (AME) will be joining the UXP family very soon</h4><p>UXP in Premiere Pro has been in a private beta phase for a few months now. If you need access to the pre-release, you can reach out to us at <a href="mailto:ppro-uxp-extensibility@adobe.com">ppro-uxp-extensibility@adobe.com</a>. The public beta is expected to launch in early December, allowing you to obtain the Premiere Pro beta and the latest version of UXP Developer Tool (UDT) from Creative Cloud Desktop app (CCD) to start creating UXP plugins.</p><p>AME will soon be onboarding with UXP. The private beta is tentatively scheduled for December, with general availability (GA) coinciding with the Premiere Pro release. For pre-release access, please reach out to us at <a href="mailto:ppro-uxp-extensibility@adobe.com">ppro-uxp-extensibility@adobe.com</a> for more information.</p><h3>Upcoming Marketplace changes</h3><p>To comply with the <a href="https://commission.europa.eu/strategy-and-policy/priorities-2019-2024/europe-fit-digital-age/digital-services-act_en"><strong>European Union Digital Services Act</strong></a> developers must provide additional information (e.g. phone number, email address, etc.) in their publisher profile in order to be shown to users in the European Union. If you choose not to provide this information, your listing won’t be visible or available in the <a href="https://exchange.adobe.com/">Exchange</a> or in our Creative Cloud Desktop app for users in the European Union beginning Feb 17, 2025. Please stay tuned for more information and details on how to update your information. We will give you plenty of notice before this change takes effect.</p><h3>CEP</h3><p><a href="https://github.com/Adobe-CEP/CEP-Resources/blob/master/CEP_12.x/Documentation/CEP%2012%20HTML%20Extension%20Cookbook.md">CEP 12</a> shipped with Photoshop 25.12, Premiere Pro 25.0, and After Effects 25.0. InDesign and Illustrator will come later. CEP 12 will be the last major update to CEP, although critical security issues will continue to be addressed. There are no new features planned further.</p><p>CEP 12 now supports a newer version of Chromium 99, updated v8 to 9.9.115, and updated the deprecated OpenGL APIs to Metal on Mac. Most plugins should continue to work as is, but please check for any irregularities. CEP 12 works with NodeJS 17.7.1, so some extensions built on older versions of NodeJS may need to be updated in order to continue to load. If you run into a critical issue, please post it in <a href="https://community.adobe.com/t5/exchange/ct-p/ct-exchange">the forums</a> or email <a href="mailto:ccintrev@adobe.com">ccintrev@adobe.com</a>.</p><p>For more specifics, check the <a href="https://github.com/Adobe-CEP/CEP-Resources/blob/master/CEP_12.x/Documentation/CEP%2012%20HTML%20Extension%20Cookbook.md">CEP Cookbook</a>. Be sure to check the <a href="https://github.com/Adobe-CEP/CEP-Resources/blob/master/CEP_12.x/Documentation/Issues.md">known issues</a> and <a href="https://github.com/Adobe-CEP/CEP-Resources/blob/master/CEP_12.x/Documentation/CEP%2012%20HTML%20Extension%20Cookbook.md#migration-from-cep-11-to-cep-12">migration notes</a>.</p><p><em>Subscribe to our </em><a href="http://adobe.ly/devnews"><em>Creative Cloud Developer Newsletter</em></a><em> and join the Creative Cloud Desktop Office Hours (the next one is on </em><a href="https://events.ringcentral.com/events/office-hours-for-adobe-creative-cloud-developers-november-21-2024-c1aa9b2f-2cf5-4c60-b776-58190a945b7e"><em>November 21st</em></a><em>) to stay up to date with the latest.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=0dd5c663563e" width="1" height="1" alt=""><hr><p><a href="https://medium.com/adobetech/updates-for-creative-cloud-desktop-extensibility-0dd5c663563e">Updates for Creative Cloud Desktop Extensibility</a> was originally published in <a href="https://medium.com/adobetech">Adobe Tech Blog</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[AI-Powered Red Teaming: Keeping Pace with Our Adversaries]]></title>
            <link>https://medium.com/adobetech/ai-powered-red-teaming-keeping-pace-with-our-adversaries-92984bab5ebb?source=rss----9342990108af---4</link>
            <guid isPermaLink="false">https://medium.com/p/92984bab5ebb</guid>
            <category><![CDATA[red-team]]></category>
            <category><![CDATA[offensive-security]]></category>
            <category><![CDATA[ai-tools]]></category>
            <category><![CDATA[red-team-tools]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[Renae Kang]]></dc:creator>
            <pubDate>Tue, 15 Oct 2024 17:02:23 GMT</pubDate>
            <atom:updated>2024-10-15T21:03:07.514Z</atom:updated>
            <content:encoded><![CDATA[<h4>By <a href="https://www.linkedin.com/in/ty-anderson-redteamer/">Ty Anderson</a>, Senior Red Team Engineer</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/672/1*bMhtFJK7bty6eAuGKdK8Dw.jpeg" /><figcaption>Generated with <a href="https://www.adobe.com/products/firefly.html">Adobe Firefly</a>.</figcaption></figure><p>As the <a href="https://blog.developer.adobe.com/cybersecurity-red-teaming-when-assumptions-arent-enough-d3666a61b660">Adobe Red Team</a> proactively helps strengthen the company’s overall security posture, we often find ourselves needing to develop new capabilities to emulate the growing number of increasingly complex adversarial attacks. Adversaries today are stepping up their attack work by using AI and we need to do the same to stay one step ahead.</p><p>Over the past year, we’ve been utilizing AI tools to assist us in scaling our activities effectively and efficiently, particularly as we <a href="https://attack.mitre.org/techniques/T1587/">develop capabilities</a> for our Red Team operations. Using AI has allowed us to work smarter by building out new solutions more quickly — including malware, exploits, and our own custom C2 (Command and Control) systems — while enabling our team members to focus their valuable time on work where their unique expertise adds the most value. Conditions such as running processes and supported code languages can change dramatically between environments, and AI tools quickly provide working (or close-to-working) solutions that match the specific needs of the various situations we encounter.</p><p>In this blog, I will illustrate how we use AI in our Red Team operations to emulate adversaries more accurately in our efforts to stay ahead of their attacks.</p><h4><strong>Using AI to Beat AI-Enabled Attacks</strong></h4><p>As a Red Team, we must closely monitor the actions of real-world adversaries so we can align with their methods of attack. Our use of AI tooling factors into this knowledge and helps us in our efforts to stay ahead of these adversaries.</p><p>By rigorously testing the defenses of our own product teams with the help of AI, we aim to be better and faster at finding, exploiting, and subsequently defending the same targets that these adversaries are targeting. AI-fueled testing aids us in our mission to strengthen Adobe’s ability to withstand sophisticated attacks and protect our company and customer data.</p><h4><strong>AI Increases Red Team Efficiency</strong></h4><p>When we prepare and build prerequisite tools and artifacts for a specific test or measurement, we usually do it to support our operational objectives. Aside from delivering results to the company and helping guide security improvements, the Red Team produces much of its value when we conduct actual testing and generate traffic. The logs that result from these tests provide tangible progress towards our ongoing objectives. Freeing up cycles from the preparatory phases of a task enables Red Team engineers to invest more time and focus into executing crucial steps of our attack chains — the hands-on, keyboard functions — needed to reach objectives that directly correlate to Red Team recommendations.</p><p>AI also helps our engineers work smarter, not harder, by saving us dozens of hours of studying, learning, and practicing new coding languages during the first draft of tools and supplying code comments that explain the code’s functionality. Offering a low barrier to use, the Red Team then modifies and adjusts the tools to ensure they function the way we intended them to work.</p><p>The Adobe Red Team uses different AI tools to speed up our research and development in the following ways:</p><ul><li><strong>Educating Our Operators:</strong> AI tools quickly summarize relevant blogs and articles to teach our operators about various adversaries and their objectives in a timely manner. For instance, after the release of an initial blog detailing an adversary’s recent actions, it’s common to see follow-up posts that provide additional insights and perspectives. AI enhances our ability to identify and digest these key insights and perspectives by gathering, synthesizing, and summarizing all relevant data, allowing our operators to analyze the information easily and probe deeper where needed.</li><li><strong>Building Tools:</strong> AI supports quicker and more efficient drafting of tools for different aspects of Red Team operations. This can include building scanning tools to use during reconnaissance, exploit tools to help us obtain initial access, and C2 modules to help us scale post-exploitation actions. Previously, having to review documentation and select the best function for a task slowed down our coding process. Now we can simply ask AI which built-in function to use or even have it write the function for us, which significantly speeds up development.</li><li><strong>Freeing Time and Resources:</strong> AI frees time for Red Team members to conduct more tests and reach our objectives quicker. For example, by reducing research time by 30 percent when analyzing adversary behavior, the Red Team can now repurpose that saved time to conduct an additional test. This increased efficiency enables us to yield more results in less time, while focusing on delivering our measurements rather than building capabilities, which ultimately drives greater impact across the company.</li></ul><h4><strong>AI Enhances Red Team Efficiency</strong></h4><p>The Adobe Red Team has incorporated AI-generated tools into our operations, which allows us to spend more time executing and achieving effective results. With more time to invest in execution, we’re able to play out adversarial scenarios more realistically and generate traffic that more-closely resembles actual adversary behavior.</p><p>Spending less time on resource development also allows us to invest more in enhancing the quality of our presentations. We’ve been able to achieve this by gathering more feedback, reaching a broader range of stakeholders, and sharing security recommendations ahead of scheduled presentations so that relevant product and security teams arrive prepared with their own analysis and work already underway. These advances in communication and reporting have strengthened our influence across the company, driving further investment in security initiatives that help protect our customers.</p><h4><strong>More to Come</strong></h4><p>The benefits of integrating AI into Red Team operations are already evident. Our increased focus on execution and delivery of results has helped us improve the quality of both our testing and our reporting. Leveraging AI tools not only boosts our efficiency, but also enhances adaptability across diverse environments, while maintaining the relevance and impact of our efforts.</p><p>However, we’re only beginning to uncover the full potential of leveraging AI for Red Team success. As we continue to explore and integrate these tools into our operations, we anticipate even greater enhancements in effectiveness and innovation. Our AI journey is far from over and we’re looking forward to discovering new ways to drive further impact across the company.</p><h3>What’s on Your Mind? We Want to Hear from You!</h3><p>Your opinion matters to us. Help shape the future of our blog by sharing your ideas and preferences. Click the link below to take a quick survey and tell us what you’d like to read about next.</p><p><a href="https://survey.adobe.com/jfe/form/SV_08TWfd3N5aWWNWS"><strong>&gt; Take the Security@Adobe Tech Blog Survey</strong></a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=92984bab5ebb" width="1" height="1" alt=""><hr><p><a href="https://medium.com/adobetech/ai-powered-red-teaming-keeping-pace-with-our-adversaries-92984bab5ebb">AI-Powered Red Teaming: Keeping Pace with Our Adversaries</a> was originally published in <a href="https://medium.com/adobetech">Adobe Tech Blog</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Scaling Your Threat Modeling Program using GenAI]]></title>
            <link>https://medium.com/adobetech/scaling-your-threat-modeling-program-using-genai-934160279889?source=rss----9342990108af---4</link>
            <guid isPermaLink="false">https://medium.com/p/934160279889</guid>
            <category><![CDATA[application-security]]></category>
            <category><![CDATA[generative-ai-use-cases]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[genai]]></category>
            <category><![CDATA[threat-modeling]]></category>
            <dc:creator><![CDATA[Renae Kang]]></dc:creator>
            <pubDate>Mon, 23 Sep 2024 16:20:53 GMT</pubDate>
            <atom:updated>2024-09-23T18:00:06.193Z</atom:updated>
            <content:encoded><![CDATA[<h4>By <a href="https://www.linkedin.com/in/linwood-jones-227661b2/?utm_source=share&amp;utm_campaign=share_via&amp;utm_content=profile&amp;utm_medium=ios_app">Linwood Jones</a>, Senior Application Security Engineer and <a href="https://www.linkedin.com/in/pawansuresh/">Pawan Suresh</a>, Senior Application Security Engineer</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*3xFCcIqwiipMZRBFp9IRYA.jpeg" /><figcaption>Generated with <a href="https://www.adobe.com/products/firefly.html">Adobe Firefly</a>.</figcaption></figure><p>In the Security industry, the manual processes that drive traditional threat modeling methods are increasingly inadequate for managing the growing scale and complexity of today’s products and services. Lack of scalability leaves gaps in security, undermines customer trust, and hinders the ability to track patterns and provide consistent guidance due to insufficient data collection. The advent of generative AI (GenAI) further exposes the limitations of manual methods as it opens the door to more sophisticated and harder-to-detect threats.</p><p>Adobe has an ongoing commitment to explore and adopt state-of-the-art capabilities as our business and security practices evolve. We recognize that as we continue to grow and scale as a company, simply relying on manual threat models would lead to significant bottlenecks. To address these challenges and improve our overall security posture, we transformed our threat modeling program by integrating GenAI capabilities.</p><h3><strong>Transforming Threat Modeling Using GenAI</strong></h3><p>By leveraging automation and AI-driven insights, Adobe Security’s new GenAI-based threat modeling platform transforms the threat modeling process throughout Adobe by addressing the scalability, sophistication, and data collection issues inherent in traditional manual threat modeling methods. It empowers Adobe product and engineering teams to create robust threat models with ease, while ensuring our teams have access to best practices and expert guidance necessary to protect our digital ecosystem.</p><p>Here are the benefits of leveraging automation and AI-driven insights as part of our threat modeling platform:</p><h4><strong>Simplifies the Security Process</strong></h4><p>GenAI analyzes workflow information from user-provided design documents, immediately identifies potential threats based on Adobe-specific context, and maps them to known weaknesses (Common Weakness Enumerations or CWEs) and common attack patterns (Common Attack Pattern Enumeration and Classifications or CAPEC IDs). This automation is a significant value addition for product teams because it allows them to focus on innovation without compromising security.</p><h4><strong>Provides Immediate, Actionable Feedback</strong></h4><p>The platform provides immediate, in-line, real-time feedback on detected threats and offers clear, specific, and actionable mitigation strategies based on security best practices, which empowers our product teams to remediate the risks before they can be exploited by adversaries and helps to implement security measures effectively and efficiently.</p><h4><strong>Gives Product Teams More Autonomy</strong></h4><p>We integrated security policies and best practice documentation directly into the platform to give teams the autonomy to manage the security of their products while being supported by expert guidance. To prevent over-reliance on AI, we established a protocol for critical reviews that require human involvement. In these scenarios, hands-on consultation with a security researcher includes manual threat modeling to help identify potential threats. This process ensures that complex and high-risk scenarios are thoroughly reviewed by human experts armed with AI-driven insights that they assess, assure, and action as part of their threat modeling capabilities.</p><h4><strong>Improves Collaboration and Visibility</strong></h4><p>The platform includes a user-friendly, self-service interface that acts as the centralized hub for all threat modeling activities. Product teams can create and share threat models within their team, enhancing collaboration. Since the threat model is a living document, it can be updated as the application evolves. Product teams can initiate updates whenever new features, infrastructure changes, or libraries are introduced. Teams also have the flexibility to determine how frequently they update the threat model. All threat models are stored in a central repository, enabling us to identify recurring patterns and develop targeted security solutions helping improve protection across all Adobe products and services.</p><h3><strong>Enhancing Security Posture and Developer Productivity</strong></h3><p>Since deploying the automated GenAI-based threat modeling platform, we’ve detected over 400 actionable threats, providing product teams with clear mitigation strategies to promptly address these vulnerabilities. The result is an enhanced security posture and reduced potential risk for Adobe.</p><p>In addition, this new user-friendly interface has led to a 160 percent increase in productivity and efficiency across our user interface (UI) each month. Additionally, this streamlined process means that 80 percent of all threat models are now created in under 30 minutes, allowing our teams to focus more on innovation and less on the intricacies of threat modeling.</p><p>Overall, Adobe Security’s GenAI-based threat modeling platform has empowered our product and engineering teams to be more proactive and efficient in addressing security threats, benefiting not only Adobe, but ultimately our customers and partners by improving the security of our digital ecosystem. As we look ahead, our focus remains on advancing the platform with AI-driven capabilities, integrating deeper security insights throughout the development process, and continuously exploring new ways to anticipate and mitigate evolving threats in real time.</p><h3>What’s on Your Mind? We Want to Hear from You!</h3><p>Your opinion matters to us. Help shape the future of our blog by sharing your ideas and preferences. Click the link below to take a quick survey and tell us what you’d like to read about next.</p><p><a href="https://survey.adobe.com/jfe/form/SV_08TWfd3N5aWWNWS"><strong>&gt; Take the Security@Adobe Tech Blog Survey</strong></a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=934160279889" width="1" height="1" alt=""><hr><p><a href="https://medium.com/adobetech/scaling-your-threat-modeling-program-using-genai-934160279889">Scaling Your Threat Modeling Program using GenAI</a> was originally published in <a href="https://medium.com/adobetech">Adobe Tech Blog</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>