API Security Meets Government Regulators
The Australian Cyber Security Centre (ACSC) leads the Australian Government’s efforts to improve cyber security and recent data breaches and the potential theft of private data, have put a spotlight on API security. API Abuses and Related Data Breaches The ACSC provides a valuable service as businesses continue to move ... Read More
API Security Meets Government Regulators
The Australian Cyber Security Centre (ACSC) leads the Australian Government’s efforts to improve cyber security and recent data breaches and the potential theft of private data, have put a spotlight on API security. API Abuses and Related Data Breaches The ACSC provides a valuable service as businesses continue to move ... Read More
What is Account Takeover (ATO)?
Identity theft takes many shapes and forms, and account takeover is one of them. In this case, ATO happens when a cybercriminal gains unauthorized access to a user’s financial, airline miles, retail, streaming, or mobile device account. . Attackers can then make wholesale changes to compromised accounts or use them ... Read More
External Attack Surface Management for APIs
The Attack Surface Has Grown with API Usage Application programming interfaces (APIs) help ensure a smooth running and engaging experience for mobile and web applications. For example, consumers are leveraging APIs behind the scenes when they use a mobile app to access their video streaming service, or their bank account ... Read More
External Attack Surface Management for APIs
The Attack Surface Has Grown with API Usage Application programming interfaces (APIs) help ensure a smooth running and engaging experience for mobile and web applications. For example, consumers are leveraging APIs behind the scenes when they use a mobile app to access their video streaming service, or their bank account ... Read More
Mergers and Acquisitions in API Security and Bot Management
Continued Consolidation in API Security and Bot Management – A Need for Unified API Protection As we have seen of late, in attempts to offer end-to-end application protection, web application firewall (WAF) vendors have been acquiring bot management companies. Examples of this activity include Imperva and Distil Networks, and F5 ... Read More
Mergers and Acquisitions in API Security and Bot Management
Continued Consolidation in API Security and Bot Management – A Need for Unified API Protection As we have seen of late, in attempts to offer end-to-end application protection, web application firewall (WAF) vendors have been acquiring bot management companies. Examples of this activity include Imperva and Distil Networks, and F5 ... Read More
When Whac-A-Mole Won’t Work Fileless Malware
Traditional antimalware protection relies on file signatures and is ineffective against the rising threat of fileless malware attacks. Extended endpoint protection (EEP) from Alert Logic gives you the security you need ... Read More
NIST From Cells to Cybersecurity
A look at the role of the National Institute of Standards and Technology (NIST) and the challenges organizations face trying to achieve and maintain compliance with the NIST Cybersecurity Framework guidelines ... Read More
The People Problem and Managed Security Services
Cybersecurity has a people problem. A dramatic rise in cyber attacks coupled with a severe shortage of qualified cybersecurity professionals make it very difficult to maintain effective cybersecurity. An MSSP (managed security services provider) can help ... Read More