The top 10 API security risks OWASP list for 2023

As more organizations rely on the automation and scale that web applications and connected services provide, application programming interface (API) security has become imperative. In just the last year alone, unique attackers targeting customer APIs grew by 400%, proving that organizations must take a proactive approach to secure these increasingly valuable services. But considering the […]

The post The top 10 API security risks OWASP list for 2023 appeared first on Security Intelligence.

Continue reading The top 10 API security risks OWASP list for 2023

3 Cloud Security Trends to Watch in 2022

Many organizations have cloud security on their minds going into 2022. In April 2021, for instance, Gartner predicted that global end-user spending on cloud management and security services would reach $18 million the following year. That’s a growth of 30% over the previous two years.  The forecasts discussed above raise an important question. Where exactly […]

The post 3 Cloud Security Trends to Watch in 2022 appeared first on Security Intelligence.

Continue reading 3 Cloud Security Trends to Watch in 2022

What the Internet Bug Bounty Teaches About Open-Source Software Security

The security platform HackerOne recently announced the latest version of their Internet Bug Bounty (IBB) program. The IBB strives to enhance open-source software security by pooling resources and encouraging security experts (they call themselves hackers) to find flaws in open-source software (OSS).  Now, the program has introduced a new crowd-funding method. This enables more organizations […]

The post What the Internet Bug Bounty Teaches About Open-Source Software Security appeared first on Security Intelligence.

Continue reading What the Internet Bug Bounty Teaches About Open-Source Software Security

Data Security: Defending Against the Cache Poisoning Vulnerability

Do you trust your cache? To meet the demands of the end-users and speed up content delivery, content caching by web servers and content delivery networks (CDN) has become a vital part of the modern web. To explain how this can create vulnerabilities when it comes to data security requires first asking another question. Namely, […]

The post Data Security: Defending Against the Cache Poisoning Vulnerability appeared first on Security Intelligence.

Continue reading Data Security: Defending Against the Cache Poisoning Vulnerability

The OWASP Top 10 Threats Haven’t Changed in 2021 — But Defenses Have

The more things change, the more they stay the same. Despite a changing threat landscape and threat actors who keep upping their game, the vulnerabilities behind the threats remain consistent. The OWASP Top 10, ranked by the Open Web Application Security Project, lists the 10 most prominent and dangerous risks and threats for applications. The […]

The post The OWASP Top 10 Threats Haven’t Changed in 2021 — But Defenses Have appeared first on Security Intelligence.

Continue reading The OWASP Top 10 Threats Haven’t Changed in 2021 — But Defenses Have