Third-Party APIs: How to Prevent Enumeration Attacks
Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do about it. Continue reading Third-Party APIs: How to Prevent Enumeration Attacks
Collaborate Disseminate
Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do about it. Continue reading Third-Party APIs: How to Prevent Enumeration Attacks
Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do about it. Continue reading Third-Party APIs: How to Prevent Enumeration Attacks
Business email compromise (BEC) attacks represent a small percentage of email attacks, but disproportionately represent the greatest financial risk. Continue reading Understanding the Payload-Less Email Attacks Evading Your Security Team
Omnichannel views of customers are a competitive edge — but they have to be appropriately implemented. Continue reading Pairing Privacy and Security with Digital Identities in Retail
IIoT-generated data – calibrations, measurements and other parameters – still need to be stored, managed and shared securely. Continue reading Plugging the Data Leak in Manufacturing