Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Get Smart(er) about the business value of API security

API attacks have dominated the cybersecurity news cycle lately. In early 2023, T-Mobile made news for an API-based breach of 37 million PII records of its past and present customers. And last year, Optus, a major telecommunications company in Australia, experienced an API security incident that exposed around 10 million customer records. And API attacks that aren't quite as ”newsworthy” happen every single day.

Unsolved Remote Access Challenges Continue to Propel SASE in 2023, Finds New Cato Survey

Unsolved Remote Access Challenges Continue to Propel SASE in 2023, Finds New Cato Survey By all accounts, 2023 is expected to see strong growth in the SASE market. Gartner has already predicted in The Top 5 Trends in Enterprise Networking and Why They Matter: A Gartner Trend Insight Report (subscription required) that by 2025, 50% of SD-WAN purchases will be part of a single vendor SASE offering, up from less than 10% in 2021.

And The Award Goes To...

Since 2009 we have been innovating and creating the best and most innovative cybersecurity technologies for our customers. This hard work pays off every day when we talk with our customers and others in the industry, about the strength of their security posture with CleanINTERNET®. We also appreciate when our company and technology is validated by third parties.

AlgoSec for IaC: How to identify risks from your pull requests

This video demonstrates how the AlgoSec platform integrates into your DevOps workflow early in the game, automatically identifying connectivity risks and providing ways to remediate them. You never have to leave where you're working to write better code. IaC Connectivity Risk Analysis enables immediate feedback right where you're working in the pull request by providing risk check results as comments.

What is firewall optimization?

Firewall optimization (also known as firewall analysis) is the process of analyzing and adjusting the configuration and policy set of a firewall to improve performance and security. This process involves reviewing and corelating log data and device configurations, identifying potential vulnerabilities and weaknesses, and providing recommendations for remediation. Performing these processes is complex, which is why tools like firewall analyzers are useful.

Merchant Onboarding Made Easy: Benefits of Using a KYC API

Onboarding merchants is crucial for ongoing development if you’re a merchant acquirer or payment service provider (PSP). Of course, you want more businesses since they generate more sales. On the other hand, bringing on dubious merchants that are likely to approve fraudulent transactions merely leads to fees and losses that have an effect on your bottom line. The world of payments is expanding quickly and changing all the time as fraudsters become more skilled and fraud assaults rise.

Mitigating path traversal vulns in Java with Snyk Code

Path traversal is a type of security vulnerability that can occur when a web application or service allows an attacker to access server files or directories that are outside the intended directory structure. This can lead to the unauthorized reading or modification of sensitive data.

Cybersecurity Advice for Businesses Without Information Security Professionals

In this video, we explore what businesses without information security professionals can do to protect themselves from cyber threats. While it would be ideal for all businesses to have experienced cyber personnel who can advise on critical assets and best steps, this is not always possible. Connect with Your host James Rees Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.