Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Hello CISO - Episode 11 - Part 1: Hiring Top Tier Security Professionals

Hiring can be more art than science. What should you look for when hiring security professionals? How important are degrees and certifications, really? In this episode, Troy breaks down how to spot the brightest talent. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager.

CrowdStrike and Abnormal Security: Better Together

Abnormal Security CEO Evan Reiser and CrowdStrike President Michael Sentonas announce a new strategic technology partnership that integrates the CrowdStrike Falcon platform with the Abnormal platform to offer best-in-class email attack detection and response with endpoint and automated account remediation. Abnormal Security is also a member of the CrowdXDR Alliance, a revolutionary security alliance that delivers unified XDR enterprise-wide.

Risks of credit and debit card Fraud: Why PCI DSS is Essential?

The Advancement in technology and online payment transaction has offered an immense amount of convenience to both consumers and businesses. The ease and widespread acceptance of online payment including the credit/debit card transaction has streamlined business processes and payment transactions greatly.

ASCII vs. Unicode: A full tutorial

The encoding scheme you choose as a developer can have far-reaching consequences for your application’s functionality, security, and performance–in other words, it could be the difference between a seamless user experience and a catastrophic data failure. ASCII is a popular choice, with over 95% of all websites using it, and Unicode is quickly gaining ground for many applications on over 60% of websites.

API security: the new security battleground

Regardless of the techniques used, going big, expensive, and glossy – while potentially useful - doesn’t replace the need for a well-reasoned approach to securing assets founded on traditional activities and principles. Innumerable assets are housed behind APIs, and the widespread use of APIs means they are high-profile targets. Securing them is of the utmost importance.