Infoblox certificates Datadog Web3 DNSSEC OPSWAT web application security

Datadog Report Surfaces Pair of Sophisticated AWS Attacks

A Datadog report found that cybercriminal activity aimed specifically at AWS cloud infrastructure services is increasing ...
Security Boulevard
172

Introducing the Wallarm 2024 API ThreatStatsTM Report

The Wallarm Security Research team is pleased to share the latest version of our API ThreatStats report. This report serves as a key resource for API, Application security practitioners. It emphasizes the ...
The elements of zero trust: Identity, device, network, application, data and the foundational elements including context, visibility, automation and governance

Navigating Zero Trust in the Cloud: Challenges vs. Solutions

Zero Trust is rapidly transitioning from theory to practice, with 51% of enterprises having already implemented some capabilities. Federal government strategy has been a big driver, ever since a 2021 Executive Order ...

Python FBot Hacking: Cloud and SaaS Platforms Targeted

In the ever-evolving landscape of cybersecurity, a recent revelation has come to light – the emergence of a new Python-based hacking tool. Malicious activities initiated using the tool are being dubbed FBot ...

The Vendor of My Cloud-Vendor is My Friend

What does a suburban roofing company have in common with a cloud supplier? The answer can be found in the passage of time. This conversation occurred with Sean Heide, research technical director ...
Androxgh0st macOS malware cracked software trojan

Androxgh0st Haunts Cloud Credentials

The FBI and the U.S. CISA warned of new Androxgh0st malware that scans for and extracts application secrets ...
Security Boulevard
657859f194cf500d7cc9eeeb_1280x720-p-800

Webinar: Join us for the latest in API Threats on January 24, 2024

In today's complex digital landscape, the security of APIs has become paramount. As we move into 2024, it's essential to stay ahead of the evolving API security threats and vulnerabilities. The upcoming ...

Why is data security important?

| | Cloud Security, education
Most K-12 technology directors can’t stop talking about cybersecurity. But have you ever wondered why? The truth is there are many reasons why safeguarding personal data is essential. From reputational damage to ...
workload risk of AI, Kubernetes, cloud, multi-cloud, security, organizations cloud security Workload Protection Transforming Cybersecurity Hybrid Cloud

Understanding Cloud Workload Protection: Technologies and Best Practices

Implementing cloud workload protection strategies is essential for any organization utilizing cloud services. Here's what you need to know ...
Security Boulevard
device security

The State of Open Source Cloud-Native Security

As 2024 kicks off, here's where cloud-native supply chain security stands and what to expect in the immediate future ...
Security Boulevard