API Security Meets Government Regulators

API Security Meets Government Regulators

| | API security, owasp
The Australian Cyber Security Centre (ACSC) leads the Australian Government’s efforts to improve cyber security and recent data breaches and the potential theft of private data, have put a spotlight on API security.  API Abuses and Related Data Breaches  The ACSC provides a valuable service as businesses continue to move ... Read More
API Security Meets Government Regulators

API Security Meets Government Regulators

| | API security, owasp
The Australian Cyber Security Centre (ACSC) leads the Australian Government’s efforts to improve cyber security and recent data breaches and the potential theft of private data, have put a spotlight on API security.  API Abuses and Related Data Breaches  The ACSC provides a valuable service as businesses continue to move ... Read More

What is Account Takeover (ATO)?

| | API security, bot management
Identity theft takes many shapes and forms, and account takeover is one of them. In this case, ATO happens when a cybercriminal gains unauthorized access to a user’s financial, airline miles, retail, streaming, or mobile device account. . Attackers can then make wholesale changes to compromised accounts or use them ... Read More
Continuous Attack Surface Monitoring

External Attack Surface Management for APIs

The Attack Surface Has Grown with API Usage Application programming interfaces (APIs) help ensure a smooth running and engaging experience for mobile and web applications. For example, consumers are leveraging APIs behind the scenes when they use a mobile app to access their video streaming service, or their bank account ... Read More
Continuous Attack Surface Monitoring

External Attack Surface Management for APIs

The Attack Surface Has Grown with API Usage Application programming interfaces (APIs) help ensure a smooth running and engaging experience for mobile and web applications. For example, consumers are leveraging APIs behind the scenes when they use a mobile app to access their video streaming service, or their bank account ... Read More
Mergers and Acquisitions in API Security and Bot Management

Mergers and Acquisitions in API Security and Bot Management

Continued Consolidation in API Security and Bot Management – A Need for Unified API Protection As we have seen of late, in attempts to offer end-to-end application protection, web application firewall (WAF) vendors have been acquiring bot management companies. Examples of this activity include Imperva and Distil Networks, and F5 ... Read More
Mergers and Acquisitions in API Security and Bot Management

Mergers and Acquisitions in API Security and Bot Management

Continued Consolidation in API Security and Bot Management – A Need for Unified API Protection As we have seen of late, in attempts to offer end-to-end application protection, web application firewall (WAF) vendors have been acquiring bot management companies. Examples of this activity include Imperva and Distil Networks, and F5 ... Read More

When Whac-A-Mole Won’t Work Fileless Malware

|
Traditional antimalware protection relies on file signatures and is ineffective against the rising threat of fileless malware attacks. Extended endpoint protection (EEP) from Alert Logic gives you the security you need ... Read More

NIST From Cells to Cybersecurity

|
A look at the role of the National Institute of Standards and Technology (NIST) and the challenges organizations face trying to achieve and maintain compliance with the NIST Cybersecurity Framework guidelines ... Read More

The People Problem and Managed Security Services

|
Cybersecurity has a people problem. A dramatic rise in cyber attacks coupled with a severe shortage of qualified cybersecurity professionals make it very difficult to maintain effective cybersecurity. An MSSP (managed security services provider) can help ... Read More