Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

A New Strategy for Reducing API Risk

As organizations increasingly embrace APIs, a new challenge has emerged - the complexity of managing, securing, and understanding the sprawling API landscape within an organization. To tackle these concerns head-on, Salt Security has pioneered the industry's first API posture governance engine and a suite of advanced capabilities designed to bring clarity, security, and efficiency to your API ecosystem.

10 Cybersecurity Threats for 2024: Prediction and Detection

By the end of 2025, the cost of cyber attacks on the global economy is predicted to reach $10.5 trillion. This data shows that organizations across industries must be prepared against new threats, with a focus on ensuring resilience and security. Navigating this challenging landscape requires organizations to stay up to date on upcoming security challenges.

Vendor Email Compromise Attacks Against Financial Services Surge 137% Last Year

Analysis of 2023 attacks shows how the financial services industry had a very bad year, with increases in both vendor email compromise (VEC) and business email compromise (BEC) attacks, targeting millions of dollars using very specific methods. There’s no industry that has more money than the one dealing in it. So, it shouldn’t come as a surprise that attacks on the financial services industry continue at an increasing rate.

Architecture Drift: What It Is and How It Leads to Breaches

Cybercriminals work around the clock to discover new tactics to breach systems. Each time a digital ecosystem changes, it can introduce a weakness for a threat actor to quickly discover and exploit. As technological innovation progresses rapidly, and organizations expand their infrastructure, this weakness may take shape in the form of architecture drift. Today, we explore the concept of architecture drift: what it is, why it matters and how application security posture management (ASPM) can help.

Leveraging Recommended Metrics for Calico to optimize and secure Kubernetes application operations

In the ever-evolving landscape of Kubernetes networking and security, Calico has proven to be a battle-hardened, scalable and robust solution. Core to Calico’s architecture are two components, Felix and Typha. And given their importance for running Kubernetes deployment, it is no surprise that monitoring these components is crucial to secure and maintain them for optimal cluster operation.

Keeper Webinar With ActualTech Media - Identity & Access Management

Keeper was invited by ActualTech Media to discuss Identity & Access Management: Keys to Success in 2024 EcoCast. Tom Cole, a solutions engineer at Keeper, dives into what makes KeeperPAM a next-gen privileged access management solution that delivers enterprise-grade password, secrets and privileged connection management in one unified platform.

Wallarm's Crusade Against Rising Credential Stuffing Threats

Credential Stuffing, a vital yet often overlooked aspect of cybersecurity, needs to be addressed with urgency. An alarmingly large segment of the population engages in the risky habit of using the same password for various accounts. This behavior parallels the risk of using a universal key for various locks in your life, such as those for your home, car, or even hotel rooms during vacations.

Digital Operational Resilience Act (DORA): Compliance from a Software Security POV

Regulatory frameworks play a crucial role in ensuring the resilience and security of organizations. One such regulation that has garnered significant attention is the Digital Operational Resilience Act (DORA). Here are the key aspects of DORA, as well as guidance for how to ensure compliance with it while measurably reducing risk to your business.

Securing Database Access: DPA Vaulted Account Approach with Native HeidiSQL Utility

In this video, we'll guide you through the process of utilising CyberArk DPA's capabilities to seamlessly connect to a Postgres database using the HeidiSQL client, leveraging the secure foundation of Vaulted Accounts for enhanced security and efficiency.

Autonomous Patching in 72 Hours: Understanding SwyftComply on AppTrana WAAP

To comply with the security audit requirements of SOC 2, PCI, and others, your application audit report should have zero open vulnerabilities. Most companies perform these audits at least annually, and the audits are more frequent for highly regulated industries such as finance and healthcare. However, 31% of critical and high vulnerabilities remain open after 180 days – according to The State of Application Security.

Kernel Introspection from Linux to Windows

The cybersecurity landscape is undergoing a significant shift, moving from security tools monitoring applications running within userspace to advanced, real-time approaches that monitor system activity directly and safely within the kernel by using eBPF. This evolution in kernel introspection is particularly evident in the adoption of projects like Falco, Tetragon, and Tracee in Linux environments.