endpoints

API Security and The Silent Menace of Unknown APIs
The digital application landscape is evolving rapidly, with APIs as the backbone of modern software development. However, amidst all this innovation lies a silent menace: the prevalence of unknown APIs. These APIs, ...

Identity, Credential Misconfigurations Open Worrying Security Gaps
A report found more than 40 million exposures are impacting 11.5 million critical business entities, with more than half related to cloud platforms ...

Prepare for the Security Resilience Onslaught
As we get ready for the upcoming RSA Conference, I gave some thought to what the industry marketing machinery will be hyping, and in looking at my inbox for clues, I saw ...

Don’t Let Your Business Be Held For Ransom(ware)
The ongoing crisis in Ukraine has been headline news for the past few months. From a cybersecurity point of view, it is painfully clear that current conditions favor cybercriminals; legitimate organizations are ...

3 Alert Sources That Will Keep Your SOC Busy and Welcome Automation in 2021
With the work-from-home shift showing little signs of letting up and new IT spending habits taking shape, organizations should prepare... The post 3 Alert Sources That Will Keep Your SOC Busy and ...

Phishing, the 3000 lb. Gorilla
SlashNext Threat Intelligence research team identified +3000% increase in COVID-19 themed phishing URLs since March 15, 2020 ...

Bolstering Corporate Security Post-COVID-19
In the new work-from-home reality, corporate security paradigms, and attitudes, must change The COVID-19 pandemic continues to affect the world in many ways, both health-wise and from a business standpoint. As we ...

Qualys Delivers on Promise to Automate Endpoint Security
Qualys this week announced the availability of a Vulnerability Management, Detection and Response (VMDR) platform based on a single agent that detects endpoint vulnerabilities and automates the patching of those systems. Sumedh ...

3 Steps to Controlling Access Inside the Network
As traffic on the network increases, so do potential vulnerabilities. Network access should be managed more tightly to keep data secure. For years, IT security has been focused primarily on defending the ...

Using Behavioral Analytics to Fight Ransomware
The recent attacks on the City of Baltimore and the Norsk Hydro energy facility in Norway are among the latest incidents that show that ransomware, a part of a larger range of ...