Security threats are always a concern when it comes to APIs. API security can be compared to driving a car. You must be cautious and review everything closely before releasing it into the world. By failing to do so, you're putting yourself and others at risk. API attacks are more dangerous than other breaches. Facebook had a 50M user account affected by an API breach, and an … [Read more...] about 6 Top API Security Risks! Favored Targets for Attackers If Left Unmanaged
security
Identity Protection: Benefits of a Unified Security Platform
As cyberattacks continue to grow relentlessly, enterprises have to continue improving their cyber defenses to stay one step ahead of the adversaries. One area that CISOs have recently started paying more attention is identity threat protection. This is not surprising considering 80% of modern attacks are identity-driven leveraging stolen credentials. In fact, identity threat … [Read more...] about Identity Protection: Benefits of a Unified Security Platform
Scale security on the fly in Microsoft Azure Cloud with Cisco Secure Firewall
The release of Microsoft Azure Gateway Load Balancer is great news for customers, empowering them to simply and easily add Cisco Secure Firewall capabilities to their Azure cloud infrastructure. By combining Azure Gateway Load Balancer with Cisco Secure Firewall, organizations can quickly scale their firewall presence across their Azure cloud environment, providing protection … [Read more...] about Scale security on the fly in Microsoft Azure Cloud with Cisco Secure Firewall
Bank BRI mitigates cybercrime and financial risk with Elastic Security
Bank BRI is one of the largest banks in Indonesia and Southeast Asia, providing end-to-end financial solutions to more than 130 million customers. As part of its core mission, the bank has a particular focus on empowering microbusinesses and advancing the financial inclusiveness of the countries it serves.With such a wide range of customers and partners, Bank BRI has created an … [Read more...] about Bank BRI mitigates cybercrime and financial risk with Elastic Security
The Case for Multi-Vendor Security Integrations
Just like the myriad expanding galaxies seen in the latest images from the James Webb space telescope, the cybersecurity landscape consists of a growing number of security technology vendors, each with the goal of addressing the continually evolving threats faced by customers today. In order to be effective, cybersecurity tools have to be collaborative—be it sharing relevant … [Read more...] about The Case for Multi-Vendor Security Integrations
The secret is out: Why Open Security is key to preventing cyber threats
For decades, the cybersecurity industry has been shrouded in secrecy. This is partly because of the misunderstanding that cybersecurity often relies on obscurity as its primary form of defense. As the thinking goes, if adversaries don’t know about or understand the security controls that security vendors have in place, it will be easier to defend against cyberattacks.While the … [Read more...] about The secret is out: Why Open Security is key to preventing cyber threats
Best Practices for Navigating the Security Poverty Line
InfoSec, like any other aspect of IT, is a matter of three factors coming together: people, process and technology. All of these factors cost time and money in some way.The truth is, there are very few organizations out there who can supply their own security programs, staff, technology, processes and everything needed for InfoSec to an efficient degree. Everyone has to … [Read more...] about Best Practices for Navigating the Security Poverty Line
Cybercriminals Developing BugDrop Malware to Bypass Android Security Features
In a sign that malicious actors continue to find ways to work around Google Play Store security protections, researchers have spotted a previously undocumented Android dropper trojan that's currently in development. "This new malware tries to abuse devices using a novel technique, not seen before in Android malware, to spread the extremely dangerous Xenomorph banking trojan, … [Read more...] about Cybercriminals Developing BugDrop Malware to Bypass Android Security Features
How to Grow Your Own Security Talent
The cyberthreat landscape has expanded in recent years, accelerated by enterprises promoting remote work and more reliance on cloud computing. These are a business necessity, and yet, facing down cybersecurity threats often doesn’t come with an expansion of resources to address them.In a future post, I’ll discuss more about the Security Poverty Line, and how organizations deal … [Read more...] about How to Grow Your Own Security Talent
Evolution of security: the story of the ILOVEYOU worm
Let’s take a trip down memory lane to May 2000. Just another day at the office: You turn on your work computer, connect to the internet and download the latest e-mail in the Microsoft Outlook client. You immediately notice a strange message with the subject line “ILOVEYOU.” A person you know confesses their love to you. Maybe a school friend… Wait, no! Even better — your older … [Read more...] about Evolution of security: the story of the ILOVEYOU worm