Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

API Security: Understanding Types, Challenges, and Best Practices

The digital world has brought advancements in all sorts of life. The applications communicate with each other over the internet to deliver effective service. API is an application language that interacts with the application server to extract the client’s intended information and produce it readable. It is estimated that the global API market will reach about 13.7 billion US dollars by 2027. This user-friendly software makes the business organization widely adopt it to enhance their growth.

Security Competency and More - Deepening our Ties with AWS

Since a lot of our customers build and run their applications in AWS, our partnership and joint solution delivery with AWS provides enormous value. We’re excited to share that we’ve deepened our ties to AWS in two compelling ways, by achieving AWS WAF Ready Status and earning AWS Security Competency. Salt is the first and only API security company in both of these vital AWS programs.

Security Obscurity: DNS Tunnelling and CensysGPT

Join Bill Carter and Robin Johns as they talk about the latest and greatest Cybersecurity topics and incidents happening across our digital landscape. In this episode we dive into the concepts and attack vectors of DNS Tunnelling, as well as start exploring the dangerous OSINT tools of Shodan and Censys. Security through obscurity used to be acceptable, but with GPTs and Adversarial GANs appearing - is this still a valid approach?

UK Security Policy Framework and Government Security Classifications Compliance

The UK government’s Security Policy Framework (SPF) outlines the expectations and requirements for security measures to be implemented across UK government departments, and external agencies handling government information and data assets. The framework covers various aspects of information security, including governance, risk management, technology and services, and culture and awareness.

Focusing On Productivity Helps Reduce Insider Risk

Many companies are concerned by the uptick in insider risk that’s come with the work-from-home boom. By one estimate, 58% of office workers work from home at least one day a week. This trend creates blind spots for companies. Managers see their employees less often, people work off network and on personal devices, and they keep schedules that don’t adhere to the previous more predictable hours.

Secure Coding Best Practices & WAAP for Application Hardening (Sanjay - Executive Director, MSCI)

Overview: In this podcast, Sanjay (Executive Director, MSCI) talks to Venky about secure coding best practices & methods to handle customer-sensitive data. He also shares why securing software isn't an accident and requires cautious efforts at an organizational level to make it possible.

Indicators of Compromise (IoCs): What Are They and How Do They Strengthen Cyber Defense?

IoCs are forensic data threat intelligence teams use to confirm cyberattack occurrences and build cyber-defense strategies. IoCs are critical in identifying system vulnerabilities, and determining how a cyber-crime was executed. While the relevance of IoCs cannot be downplayed in the cyber security space, they are not all that’s needed in building an effective cyber-defense strategy.

What Is SecOps? Security Operations Defined in 2023

The complex and growing cyber threats that impact business cybersecurity require the right intelligence. Cybercrime costs are expected to: Want proof? Cyberattacks increased by 7% globally in the first quarter of 2023 alone. Organizations need a proactive way to prevent and mitigate these threats. Enter Security Operations. Security Operations is crucial in helping organizations find, prevent and mitigate cyber threats.

How To Use a Password Manager

How you use a password manager varies slightly depending on which password manager you have. However, they all have similar functionality. To use a password manager, you first have to set your master password, set up your multi-factor authentication methods, export and import your current passwords, download the necessary apps and create new strong passwords for each of your accounts.

Lessons from the Field, Part II: Could Better IT Strategies Help You Retain Employees?

While a number of organizations have moved back to an in-person work model, some employees are pushing back and leaving for jobs that will allow them to work from home (WFH). Having become accustomed to the advantages of a WFH model, employees have a lower tolerance for inconveniences like time and money spent on commutes, being away from loved ones for long hours, packing lunches, and having to dress for an office environment.