Sonrai Security Unfurls Service to Track Data in the Cloud

Sonrai Security Unfurls Service to Track Data in the Cloud

Fresh off raising an additional $18.5 million in funding, Sonrai Security has launched a Cloud Data Control service that promises to make it easier for cybersecurity teams to keep track of what ...
Security Boulevard
Compromising Web Security, Impacting Business Continuity

Scraping Attacks: Compromising Web Security, Impacting Business Continuity

We often see businesses devising ingenious ways to pull ahead of competitors in the hyper-competitive online business industry. From tiny startups to business giants such as Amazon and Walmart, companies today have ...
Security Boulevard
Are Your Applications Secure?

Are Your Applications Secure?

Executives express mixed feelings and a surprisingly high level of confidence in Radware’s 2018 Web Application Security Report. As we close out a year of headline-grabbing data breaches (British Airways, Under Armor, ...

Prepare for PSD2: Understanding the Opportunities and Digital Risks

PSD2 introduces a new open banking environment in Europe, bringing the promise of more innovative products and services. PSD2 is expected to dramatically increase transaction volume and thus the threat of more ...
5 Tips for Managing Security for APIs

5 Tips for Managing Security for APIs

Creating APIs for your SaaS products provides invaluable benefits to your customers, allowing developers to plug into your resources and bring their products to market more quickly and efficiently than ever before ...
The API security survey revealed that on average companies manage 363 different APIs, and that two-thirds (69 percent) of organizations are exposing APIs to the public and their partners.

Survey: APIs a Growing Cybersecurity Risk

Like a lot of people, your mobile phone number is probably easily accessible to anyone with a bit of searching. Imagine if someone could take this number and your name and gain ...
devops CI_CD Process example

Security Strategies for DevOps, APIs, Containers and Microservices

More and more IT professionals see DevSecOps, a practice which integrates security measures earlier in the development process to improve production code quality, as a mainstay for future application development. Much of ...
Contending with Cybersecurity in the Age of AI vs. AI

Contending with Cybersecurity in the Age of AI vs. AI

As cyberdefenders in a war where every battle can mean winner takes all, enterprise IT departments must level the AI playing field. Twenty-five years ago, people in the cybersecurity space weren’t really ...
Security Boulevard

Getting Control of Your Cloud: 10 Predictions for 2018

Organizations that use public clouds are adopting an increasingly sophisticated approach to security. While they have become comfortable with their sensitive workloads operating in the cloud over the past few years, they ...
Why are redditors ripping images from Instagram? Because they can

Why are redditors ripping images from Instagram? Because they can

If you'd rather a bunch of random people on the internet didn't 'archive' your photos, you're not alone - Instagram is trying to stop them ...
Naked Security - Sophos