Get a Jump on Holiday Shopping: Key November Dates

Holiday ShoppingFor some of us, last-minute holiday shopping is just what we do. That said, it’s probably never fun, and two things invariably seem to happen: The gifts you want aren’t available, and you end up paying too much. That’s why shopping in November to get the best savings on what you want just might be the right thing to do this year. Here are a few sales dates to put on your calendar.

Singles Day, November 11. Originally started in China as a humorous “anti-Valentine’s Day” event, it’s become one of the biggest shopping days of the year, surpassing Black Friday and Cyber Monday. To top it off, the date, 11/11, was chosen because it symbolizes, you guessed it, four ones – aka singles. On this day, you can find huge discounts at a lot of high-end clothing stores like Athleta, Nordstrom, Lululemon, Abercrombie & Fitch, Madewell, Neiman-Marcus, and J. Crew, to name a few.

Pre-Black Friday, November 20-27. Yes, there is such a thing, as if Black Friday isn’t enough in and of itself. Nevertheless, lots of retailers get in on this. This year, you’ll want to check out early access on holiday deals at Costco, Lowe’s, Best Buy, as well as Kohl’s, GameStop, and PetSmart. You can find other merchants who offer deep discounts here.

Black Friday, November 28. It’s probably the most famous shopping day of the year, where you’ll find huge price cuts across all categories. If you’re into tech stuff, head to Apple, AT&T Wireless, Dell, Google, HP, Lenovo, or Micro Center to start. The big box places to hit are Walmart, Target, and Sam’s Club. For home goods, you’ll find savings at Bed, Bath & Beyond, Ashley Furniture, and Crate & Barrel. If you want a comprehensive list, go to blackfriday.com. (See? There’s even a website dedicated to this day!) But get ready to scroll because there’s a lot there.

Small Business Saturday, November 29. Originally launched in 2010 by American Express, this day is all about shopping at your local stores. So hit your neighborhood shops, markets, coffee shops, and boutiques to support your friends and neighbors. If you don’t know where to start and don’t have a lot of time, just Google “small business Saturday sales near me” and you’ll be good to go.

Cyber Monday, December 1. To cap off all the November savings, you can’t forget this day. And yes, it’s not technically in November, but that’s OK. This date is great because you can let your fingers do the shopping. Online-only offers are king, so hunker down and start searching. Some places with the biggest deals are, again, (and not surprisingly) Amazon, Target, and Walmart – the big three. For more price-cutting goodness, go here.

Life gets busy around this time of year, but if you take a moment, get your list and hit a few of the aforementioned stores, you’ll be way ahead come the holidays. And that just might be the best gift of all.

 

Sources

Holiday Shopping Calendar: Key Discount Dates 2025 | GiftList Blog | GiftList

https://giftlist.com/blog/holiday-shopping-calendar-key-discount-dates-2025

Why Authorization Sprawl Is the Next Big Security Blind Spot and How to Fix It

Authorization Sprawl, What is Authorization SprawlDespite major investments in cybersecurity, organizations continue to face breaches. Most security mechanisms implemented guard against threats such as password theft. However, there is a growing concern with the unchecked expansion of user access, permissions, and tokens across apps, clouds, and systems.

This growing challenge is known as authorization sprawl, and it is becoming one of the most dangerous and least visible threats in modern enterprise security.

According to insights from the SANS keynote at the RSAC 2025 Conference, attackers are increasingly exploiting this sprawl to gain legitimate, persistent access that bypasses multifactor authentication (MFA), security information and event management (SIEM) alerts, and endpoint detection and response (EDR) visibility altogether.

What is Authorization Sprawl?

Authorization sprawl occurs when access permissions multiply uncontrollably across systems, users, and applications. Every time a team or department adds a new SaaS integration, service account, or API key, another layer of permission is introduced.

In an attempt to make access to multiple applications easy, users also have single sign-on (SSO), designed to help log in once and access multiple applications securely. Here, users are granted access to several connected systems through SSO, adding to the authorization sprawl problem.

Over time, all these factors create a complex ecosystem that even security teams have a hard time tracing who can access what.

Unlike authentication, which verifies who someone is, authorization determines what one can do. When permissions expand without review, attackers take advantage of forgotten tokens, dormant accounts, or outdated roles to move freely inside systems.

Why Traditional Defenses Miss It

Most defenses focus on identity verification, such as MFA, conditional access, and endpoint protection. But once a user is authenticated, there is no monitoring. This is the blind spot that attackers exploit. Instead of breaking in, they log in using legitimate session tokens, application programming interface (API) keys, or open authorization (OAuth) grants.

The misuse of valid credentials or access tokens enables cloud-related breaches. These attacks bypass traditional detection tools because they appear to be normal activity by authorized users.

A recent incident involving Salesloft’s Drift application highlights how damaging authorization sprawl can be. Drift, an AI chatbot often integrated with Salesforce, was exploited after attackers gained access to Salesloft’s GitHub account and later its AWS environment. From there, they stole OAuth tokens and authentication credentials, exposing Salesforce data from potentially hundreds of organizations. This incident is an example of how interconnected SaaS systems and unchecked authorization links can create a cascading breach effect, where one weak point leads to multiple breaches across services.

The Business Impact of Authorization Sprawl

Aside from increasing technical risk, authorization sprawl erodes compliance, governance, and trust.

  1. Regulatory Exposure – Frameworks like GDPR, SOC 2, and HIPAA require strict access control and auditability. Untracked permissions make demonstrating compliance nearly impossible.
  2. Operational Risk – An overprivileged account can unintentionally leak data, delete configurations, or expose APIs.
  3. False Sense of Security – Zero Trust frameworks often stop at identity verification. Failing to continuously validate authorization is equivalent to protecting the front door while leaving internal doors wide open.

How to Fix Authorization Sprawl

Luckily, solving this problem does not require removing existing security controls but rather extending visibility and discipline into authorization.

  1. Conduct Regular Access Audits – Map users, roles, and permissions across your environment. Be sure to look for redundant privileges, dormant accounts, and orphaned API keys. Use tools that help visualize hidden paths and privilege escalation routes.
  2. Implement Structured Access Control – Use frameworks like role-based access control (RBAC) or attribute-based access control (ABAC). Standardizing roles ensures fewer exceptions and easier auditing.
  3. Automate Reviews and Revocations – Integrate identity and access management (IAM) with HR systems so access automatically changes when employees leave or change roles. This helps eliminate the temporary access that never gets removed.
  4. Shorten Token Lifetimes and Rotate Credentials – Session tokens and personal access tokens (PATs) should have an expiration period, such as 30 to 90 days. Using automated key rotation policies will help prevent long-lived access tokens from becoming backdoors.
  5. Enforce the Principle of Least Privilege – Grant users and systems only the minimum access needed.
  6. Extend Zero Trust to Authorization – Verification shouldn’t end with login. Apply continuous authorization checks.

Conclusion

As cloud ecosystems, APIs, and integrations continue to multiply, authorization complexity will grow exponentially. Businesses that invest in mapping and controlling authorization sprawl will stay ahead of both attackers and regulators. In cybersecurity, visibility equals control, and this begins with knowing exactly who can do what.

Initial Look at the New Tax Form Schedule 1-A: Four Key Deductions for 2025

Tax Form Schedule 1-AThe IRS has released draft Schedule 1-A, introducing four new temporary deductions within the One Big Beautiful Bill Act. If you are wondering what the new form looks like and how the calculations work, read on as we explore each below.

Modified Adjusted Gross Income (MAGI)

It is important to note that all four deductions require calculating your MAGI first, which determines eligibility and phaseout amounts for each deduction.

The Four New Deductions and How the Calculations Work

These deductions are all referred to on the schedule by their colloquial names, for example: “No Tax on Tips,” “No Tax on Overtime” and “No Tax on Car Loan Interest.” The sole exception, however, is popularly referred to as the “No Tax on Social Security” provision, which is called the “Enhanced Deduction for Seniors” on the form.

1. Tips Deduction

  • Maximum: $25,000 annually
  • Eligibility: Must receive qualified tips in customarily tipped occupations
  • Phaseout: Begins at $150,000 MAGI ($300,000 joint filers)
  • Rate: $100 reduction per $1,000 over threshold
  • Requirements: Valid Social Security number; married couples must file jointly

2. Overtime Deduction

  • Maximum: $12,500 single ($25,000 joint filers)
  • Eligibility: Only the premium portion of overtime pay (the “half” of time-and-a-half)
  • Phaseout: Same as tips deduction – begins at $150,000 MAGI
  • Rate: $100 reduction per $1,000 over threshold

3. Car Interest Deduction

  • Maximum: $10,000 annually
  • Eligibility: Interest on loans for new vehicles under 14,000 pounds and assembled in the United States
  • Phaseout: Begins at $100,000 MAGI ($200,000 joint filers)
  • Rate: $200 reduction per $1,000 over threshold
  • Requirements: Must provide VIN; loan must originate after Dec. 31, 2024

4. Enhanced Deduction for Seniors

  • Amount: $6,000 fixed deduction
  • Eligibility: All taxpayers (replaces “No Tax on Social Security” promise)
  • Phaseout: Begins at $75,000 MAGI ($150,000 joint filers)
  • Rate: 6 percent reduction of excess income over threshold

Key Points to Remember

  • All deductions are available whether you itemize or take the standard deduction
  • All require valid Social Security numbers
  • Married couples must file jointly to claim these benefits
  • Income limits mean higher earners receive reduced or no benefits
  • These are deductions, not exclusions – income is still reportable for state/local taxes

Final Steps

After you have calculated everything applicable for the four possible deductions, you will enter the total on the new line 13b on Form 1040. The total amount of the deductions entered here is removed from your income prior to calculating your tax. Remember, these are deductions and not credits, so they only reduce your taxable income and are not a direct reduction in your tax due.

You can see an example of the new draft Form 1040 illustrating this below.

Screenshot of new Form 1040

Conclusion and Draft from Status – and IRS Warning

The above provides guidance to taxpayers and professionals on how both the deductions calculations work and flow through Form 1040. The IRS warns, however, that the forms and instructions currently released are in draft form at this point. Before any forms or instructions can be released in their final state, they need to be approved by the OMB. It is not unusual for draft releases of instructions and publications to have some changes before their final release, even if only minor.