Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Using Bearer with Serverless Functions

Did you know that you can use Bearer with serverless functions? While serverless, or cloud functions, might not be your first choice for making API calls they can be a great way to proxy API requests or even act as a lightweight API gateway. They also offer a great way to bring some of the benefits of Bearer into the Jamstack. The set up process is similar to installing the Bearer Agent into a traditional app, but there are a few things to watch out for.

How Better Planning Can Save Your Business From A Data Breach

2019 was the worst year on record for data breaches by a long shot, increasing by nearly 79% from 2018. Billions of records were compromised as bad actors exploited vulnerabilities and insiders accidentally and maliciously compromised customer and company data. Unfortunately, the record won’t last long. As we approach the halfway point in 2020, this year is already on pace to be the most devastating year ever for data breaches.

The Biggest Challenges and Best Practices to Mitigate Risks in Maritime Cybersecurity

Ships are increasingly using systems that rely on digitalization, integration, and automation, which call for cyber risk management on board. As technology continues to develop, the convergence of information technology (IT) and operational technology (OT) onboard ships and their connection to the Internet creates an increased attack surface that needs to be addressed.

Secure remote access explained

As the business world adjusts to the chaotic landscape of today’s economy, securing access from remote devices and endpoints has never been more critical. Equally critical is the requirement for organizations and their employees to practice good security hygiene. With the rising number of endpoints (laptops, servers, tablets, smartphones) requiring access to corporate networks, the range of attackable targets for malicious actors has broadened substantially.

Why is Dynamic Analysis an Important Part of Your AppSec Mix?

By now, most are familiar with the concept of DevSecOps. With DevSecOps, application security (AppSec) is moved to the beginning of the software development lifecycle (SDLC). By scanning earlier in the SDLC, you are able to find and fix flaws earlier. This can result in significant time and cost savings. Most organizations understand the importance of static analysis, which scans for flaws during development, but dynamic application security testing (DAST) is just as important.