Salt Security Report Highlights Prevalence of API Vulnerabilities

Salt Security, a provider of a platform for securing application programming interfaces (APIs), today published a report that reveals the existence of vulnerabilities in APIs in an unidentified platform employed widely in the financial services indust… Continue reading Salt Security Report Highlights Prevalence of API Vulnerabilities

Spot the Ball & Security Detection Games

When I was younger, and printed newspapers were a more common household purchase, I remember fondly watching my mother play a game called “Spot the Ball.” For those of you not familiar with this, it consisted of a photograph of a recent football (socce… Continue reading Spot the Ball & Security Detection Games

Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch

Amazon’s Ring unit is moving ahead with plans to allow end-to-end encryption (E2EE).
The post Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch appeared first on Security Boulevard.
Continue reading Finally! Ring Doorbells get End-to-End Encryption, but There’s a Big Catch

Zero-Trust for the Post-Pandemic World

More than a year after the start of the COVID-19 pandemic, we’re seeing most companies either maintaining their remote work policies or slowly moving to a hybrid work model. In fact, an estimated 36.2 million Americans will be working remotely by 2025… Continue reading Zero-Trust for the Post-Pandemic World

Security in the Age of Increasing Cyberattacks

In June 2021, I was discussing with a colleague why, despite all the discourse about security, we continue to read about cybersecurity attacks. On that same day, the Belgian city of Liege announced that it had been the victim of a ransomware attack. D… Continue reading Security in the Age of Increasing Cyberattacks

Ensuring HIPAA compliance when using the cloud

Accelerated by the pandemic, health IT has continued to innovate at pace, while having to balance data protection and regulatory rules. However, critical transformations – like transitioning to the cloud – are a tougher challenge for this industry than… Continue reading Ensuring HIPAA compliance when using the cloud

Spoofed Domains Still a Persistent Threat

Domains impersonating companies and their brand names still pose a significant threat—research from Digital Shadows released today found that on average 1,100 fake websites are registered against individual organizations annually. And with commercial … Continue reading Spoofed Domains Still a Persistent Threat

Balancing Agility with Data Security

Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and … Continue reading Balancing Agility with Data Security

Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures

Secure Web Gateways (SWGs), software for controlling access to websites and SaaS not managed by corporate IT, have evolved from hardware appliances installed on premises, to software running on end user devices with varying degrees of interaction with… Continue reading Hairpinning: The Bottleneck in Most Secure Web Gateway Architectures

How Public Cybersecurity Companies Performed in 1H 2021

A good way to monitor the overall health of the IT security industry is to track the publicly traded companies in the space. I previously reported on the performance of 20 cybersecurity companies in 2020. This is an update on those 20 companies with t… Continue reading How Public Cybersecurity Companies Performed in 1H 2021