Security threats are always a concern when it comes to APIs. API security can be compared to driving a car. You must be cautious and review everything closely before releasing it into the world. By failing to do so, you're putting yourself and others at risk. API attacks are more dangerous than other breaches. Facebook had a 50M user account affected by an API breach, and an … [Read more...] about 6 Top API Security Risks! Favored Targets for Attackers If Left Unmanaged
top
Credential Theft Is (Still) A Top Attack Method
Credential theft is clearly still a problem. Even after years of warnings, changing password requirements, and multiple forms of authentication, password stealing remains a top attack method used by cyber criminals. The latest report from the Ponemon Institute shares that 54% of security incidents were caused by credential theft, followed by ransomware and DDoS attacks. 59% of … [Read more...] about Credential Theft Is (Still) A Top Attack Method
Top of Mind Security Insights from In-Person Interactions
The past few months have been chockfull of conversations with security customers, partners, and industry leaders. After two years of virtual engagements, in-person events like our CISO Forum and Cisco Live as well as the industry’s RSA Conference underscore the power of face-to-face interactions. It’s a reminder of just how enriching conversations are and how incredibly … [Read more...] about Top of Mind Security Insights from In-Person Interactions
Top 3 SIEM Requirements for Modern, Agile Security Teams
Regardless of economic conditions, IT usually operates under an axiom no one in business ever likes to hear: “We have to do more with less.” Doing more with less is essentially the default position for IT, but when it comes to security operations, that position can have real consequences.People, tools, policies, and procedures are considered vital aspects of building a … [Read more...] about Top 3 SIEM Requirements for Modern, Agile Security Teams
The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips
On the heels of President Biden’s Executive Order on Cybersecurity (EO 14028), the Office of Management and Budget (OMB) has released a memorandum addressing the heads of executive departments and agencies that “sets forth a Federal zero trust architecture (ZTA) strategy.” My good friend and fellow Advisory CISO Helen Patton has done a great summary of the memo in a previous … [Read more...] about The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips
Top 5 Key Takeaways 2021 CISO Survival Guide
Cisco Investments has always been a forward-looking organization. We spend a great deal of time working to understand the evolving nature of current and future security threats, while fostering mutually beneficial relationships with the people and organizations that seek to counter those threats. In 2021, we gathered insights from CISOs and leading industry executives, … [Read more...] about Top 5 Key Takeaways 2021 CISO Survival Guide
Nine Top of Mind Issues for CISOs Going Into 2022
It is that time of year when we inevitably reflect on the last 12 months, make a list of resolutions to solidify exactly what our priorities should be going forward and how best we can achieve them. In ‘ordinary’ times, you could mingle with your peers at industry conferences and events, swapping stories and trading information, but as we are all too aware, those opportunities … [Read more...] about Nine Top of Mind Issues for CISOs Going Into 2022
Humio Recognized as Top 3 Observability Award Winner by EMA
Humio delivers modern log management with streaming observability to enable customers to log everything and answer anything in real time. Today, Humio is proud to be recognized by Enterprise Management Associates (EMA) as a Top 3 Award Winner for Log Management and Observability. This award is further validation of Humio’s approach to delivering streaming observability for our … [Read more...] about Humio Recognized as Top 3 Observability Award Winner by EMA
Top Tips for Ransomware Defense
Ransomware is wreaking havoc. What can we do? Ransomware is making its way outside the cybersecurity space. It’s popping up everywhere from the nightly news to the G7 Summit. Indeed ransomware has entered the mainstream as threat actors increasingly focus their attention on critical infrastructure providers that can’t afford any downtime or disruption from a cyber incident – … [Read more...] about Top Tips for Ransomware Defense
Top 5 most dangerous ransomware in 2021
Over the past five years, ransomware has evolved from being a threat to individual computers to posing a serious danger to corporate networks. Cybercriminals have stopped simply trying to infect as many computers as possible and are now targeting big victims instead. Attacks on commercial organizations and government agencies require careful planning but can potentially lead to … [Read more...] about Top 5 most dangerous ransomware in 2021