Three Reasons Why Unification Drives Modern Data Security Strategy

Today, the necessities of business innovation compel most organizations to have several teams with diverse priorities managing dozens of data sources, all with different structures. This makes it impossible to secure complete ...

Five Steps to Prepare Data for a Zero-Trust Security Model

The outmoding of traditional network security Traditional network security was based on the concept of a guarded network perimeter, which is difficult to access from the outside but implicitly trusts everyone on ...
BSides Prishtina 2022

BSides Prishtina 2022 – Shkumbin Saneja’s ‘Towards Zero Trust Architecture’

Our sincere thanks to BSides Prishtina for publishing their Presenter’s BSides Prishtina 2022 Information Security Conference videos on the organization’s’ YouTube channel. Permalink ...
Insider Series: How Risk Management Committees Can Support Compliance and Insurance Requirements

Insider Series: How Risk Management Committees Can Support Compliance and Insurance Requirements

Drivers like compliance and cyber liability are influencing the way companies think about risk management, and their reliance on trusted partners like MSPs to help them manage it. In this episode of ...
BSides Prishtina 2022

BSides Prishtina 2022 – Chris Davis’ ‘LeXSS – Bypassing Lexical Parsing Security Controls’

Our sincere thanks to BSides Prishtina for publishing their Presenter’s BSides Prishtina 2022 Information Security Conference videos on the organization’s’ YouTube channel. Permalink ...
BSides Prishtina 2022

BSides Prishtina 2022 – Kastriot Fetahaj’s ‘0Keyboard (A Simple Keyboard With The Evil Inside)’

Our sincere thanks to BSides Prishtina for publishing their Presenter’s BSides Prishtina 2022 Information Security Conference videos on the organization’s’ YouTube channel. Permalink ...
BSides Prishtina 2022

BSides Prishtina 2022 – Teuta Hyseni’s ‘Keynote: Expect The Unexpected’

Our sincere thanks to BSides Prishtina for publishing their Presenter’s BSides Prishtina 2022 Information Security Conference videos on the organization’s’ YouTube channel. Permalink ...
Cloudflare Akamai software, engineering, OWASP, organizations, appsec, AppSec Salt Security API security rise GitOps Finite State API APIs tokenization

The Rise of APIs and Risks of API Security

Some strange phrases have become cultural touchstones: “Hey, Siri,” “Hey, Alexa,” and “Hey, Google.” If you’ve ever uttered any of these phrases to ask for directions, play a song or find out ...
Security Boulevard

How Imperva Data Security Fabric Reduces Splunk Ingestion Costs and Accelerates Incident Management

They say the devil is in the details. This is especially true for security professionals that use Splunk as their organization’s primary security analytics engine. Splunk analytics gives security teams a real-time ...