
API Security Requirements for PCI Secure Software Standard
With the increasing number of attacks on APIs, the PCI Security Standards Council (PCI SSC) is acting. In addition to the PCI DSS requirements and to assist businesses and help ensure their software, including APIs are not exploited, the PCI SSC publishes a PCI Secure Software Standard with supporting program ... Read More

API Security Meets Government Regulators
The Australian Cyber Security Centre (ACSC) leads the Australian Government’s efforts to improve cyber security and recent data breaches and the potential theft of private data, have put a spotlight on API security. API Abuses and Related Data Breaches The ACSC provides a valuable service as businesses continue to move ... Read More

API Security Meets Government Regulators
The Australian Cyber Security Centre (ACSC) leads the Australian Government’s efforts to improve cyber security and recent data breaches and the potential theft of private data, have put a spotlight on API security. API Abuses and Related Data Breaches The ACSC provides a valuable service as businesses continue to move ... Read More
What is Account Takeover (ATO)?
Identity theft takes many shapes and forms, and account takeover is one of them. In this case, ATO happens when a cybercriminal gains unauthorized access to a user’s financial, airline miles, retail, streaming, or mobile device account. . Attackers can then make wholesale changes to compromised accounts or use them ... Read More

External Attack Surface Management for APIs
The Attack Surface Has Grown with API Usage Application programming interfaces (APIs) help ensure a smooth running and engaging experience for mobile and web applications. For example, consumers are leveraging APIs behind the scenes when they use a mobile app to access their video streaming service, or their bank account ... Read More

External Attack Surface Management for APIs
The Attack Surface Has Grown with API Usage Application programming interfaces (APIs) help ensure a smooth running and engaging experience for mobile and web applications. For example, consumers are leveraging APIs behind the scenes when they use a mobile app to access their video streaming service, or their bank account ... Read More

Mergers and Acquisitions in API Security and Bot Management
Continued Consolidation in API Security and Bot Management – A Need for Unified API Protection As we have seen of late, in attempts to offer end-to-end application protection, web application firewall (WAF) vendors have been acquiring bot management companies. Examples of this activity include Imperva and Distil Networks, and F5 ... Read More

Mergers and Acquisitions in API Security and Bot Management
Continued Consolidation in API Security and Bot Management – A Need for Unified API Protection As we have seen of late, in attempts to offer end-to-end application protection, web application firewall (WAF) vendors have been acquiring bot management companies. Examples of this activity include Imperva and Distil Networks, and F5 ... Read More
When Whac-A-Mole Won’t Work Fileless Malware
Traditional antimalware protection relies on file signatures and is ineffective against the rising threat of fileless malware attacks. Extended endpoint protection (EEP) from Alert Logic gives you the security you need ... Read More
NIST From Cells to Cybersecurity
A look at the role of the National Institute of Standards and Technology (NIST) and the challenges organizations face trying to achieve and maintain compliance with the NIST Cybersecurity Framework guidelines ... Read More