The emergence of trinity attacks on APIs

When it comes to attacks against application programming interfaces (APIs), the building blocks that provide access to many of our applications, the OWASP API Top Ten is seen as definitive – and rightly so. Compiled in 2019 based on a risk analysis con… Continue reading The emergence of trinity attacks on APIs

As the anti-money laundering perimeter expands, who needs to be compliant, and how?

Anti-money laundering (AML) policies are getting stronger as countries crack down on any opportunity criminals might have to take advantage of services and resources to further their activity. The US has the Bank Secrecy Act, the Patriot Act, and Anti-… Continue reading As the anti-money laundering perimeter expands, who needs to be compliant, and how?

3 ways to stop cybersecurity concerns from hindering utility infrastructure modernization efforts

Utility infrastructure is in dire need of modernization. In many parts of the world, the infrastructure delivering power and water to consumers is not ready to withstand natural disasters and rising energy demands. Integrating real-time data analytics … Continue reading 3 ways to stop cybersecurity concerns from hindering utility infrastructure modernization efforts

How organizations can keep themselves secure whilst cutting IT spending

It is the immediate natural reaction of most organizations to cut costs during an economic downturn. But the economy will return and cutting back too far can be damaging in the long term. Complex situations such as a global recession often make crimina… Continue reading How organizations can keep themselves secure whilst cutting IT spending

3 business application security risks businesses need to prepare for in 2023

Ransomware has lately been the primary method of monetization for threat actors. Still, research has revealed a slight decrease in ransomware attacks and ransomware payments this past year, suggesting cybercriminals are evolving their strategies. Threa… Continue reading 3 business application security risks businesses need to prepare for in 2023

How businesses can bolster their cybersecurity defenses with open source

Open-source software enables better security for both large and small organizations. It is the foundation of today’s society and is found throughout a modern application stack, from the operating system to networking functions. It’s estimated that arou… Continue reading How businesses can bolster their cybersecurity defenses with open source

Chinese researchers: RSA is breakable. Others: Do not panic!

Quantum computing poses a great opportunity but also a great threat to internet security; certain mathematical problems that form the basis of today’s most popular cryptographic algorithms will be much easier to solve with quantum than with “classical”… Continue reading Chinese researchers: RSA is breakable. Others: Do not panic!

Understanding your attack surface makes it easier to prioritize technologies and systems

It has been observed that attackers will attempt to start exploiting vulnerabilities within the first fifteen minutes of their disclosure. As the time to patch gets shorter, organizations need to be more pragmatic when it comes to remediating vulnerabi… Continue reading Understanding your attack surface makes it easier to prioritize technologies and systems

The loneliness of leading a cybersecurity startup

Linor spends her days working with cybersecurity founders at her Venture Capital firm. Gaining insight into their experiences over the course of building these relationships and supporting the brick-laying of their visions, she shares observations on t… Continue reading The loneliness of leading a cybersecurity startup

Zero trust network access for Desktop as a Service

When you support a remote workforce, you risk opening your data, applications, and organization to the world. How can you sleep soundly at night while enabling a modern “work from anywhere” workforce? Acknowledging the inherited security challenges in … Continue reading Zero trust network access for Desktop as a Service