Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Office Hours: Tapping Cloudflare for API Security

This 30-minute interactive discussion was designed specifically for Cloudflare users to learn more about API security challenges and how your existing Cloudflare environment can give you a jumpstart to solve them. Learn how API attacks are different and why industry experts are calling 2023 the year of API security.

5 Advanced DevSecOps Techniques to Try in 2023

If you’re here, you know the basic DevSecOps practices like incorporating proper encryption techniques and embracing the principle of least privilege. You may be entering the realm of advanced DevSecOps maturity, where you function as a highly efficient, collaborative team, with developers embracing secure coding and automated security testing best practices.

Secure your organization with just-in-time access

Just-in-time (JIT) access is a cybersecurity feature where users, applications, or systems are granted access to resources only when needed and for a limited time. This approach limits the risk of privileged accounts gaining unauthorized access to sensitive data. JIT access is often used in conjunction with other security measures—such as multi-factor authentication and encryption—to provide a strong, layered defense against threats.

How to Bake Security into your CI/CD Pipeline

According to IBM Security's "The Cost of a Data Breach Report", the global cost of data breaches in 2022 increased by 2.6% compared to previous year, reaching $4.35 million. The source code of major companies like Nvidia, Microsoft, Uber, Slack, Toyota was leaked, often caused by usage of hardcoded secrets (you can see more details in the infographics below). In those cases, lateral movements were compromising software supply chain security. In their report Gartner claims about 45% of companies should expect to become targets of supply chain attacks by 2025.

5 Data Center Security Threats Businesses Must be Aware of in 2023

As reported by CIOSEA News, global cyber attacks saw an increase by 38 percent in 2022. This is in comparison to the percentage of such attacks seen in 2021. It's an alarming situation, one that clearly shows that cyber security threats are constantly growing. In some countries, cyber attacks were more severe and greater in number than in others. DIGIT News reported that the UK saw a 77 percent increase in cyber attacks in 2022. These are astounding figures, and they all point to how dangerous cyberspace has become.

What are the top 10 ways AI is revolutionizing fintech?

Artificial Intelligence (AI) is revolutionizing the financial services industry, known as fintech. From improving customer experience to reducing operational costs and mitigating risks, AI is having a significant impact on fintech. In this blog, we will explore the top 10 ways AI is being used in fintech.

What is Fintech as a service & the Impact of APIs on Fintech?

Fintech as a Service (FaaS) is a business model that enables companies to outsource financial technology (fintech) services to a third-party provider. This model provides companies with a more flexible and cost-effective way to access fintech services and improve their financial operations. Let’s explore the concept of Fintech as a Service and the impact of API solutions on Fintechs.

Top 10 Web App Security Risks & Tips to Prevent

Web application security is a growing concern for organizations of all sizes. As businesses increasingly rely on web-based applications, they become more vulnerable to malicious actors who can exploit weaknesses in their systems. As a result, it’s important for organizations to understand the common threats to web app security and how to protect themselves from them. How often do you stop and think about the security of your web applications?

The Business of Biometrics: Data Protection and Ethical Standards in Cyber Security

In this episode, I am joined by Chris Dawson and Iain Pye to talk about the biometric technology, what can be done to improve it, and how it might be utilised in the future. In this episode, we covered the following topics: We discuss biometrics and the security and management of the data collected, and how the data has been collected and used by the government, the military, and corporations. We also talk about the moral and legal issues of how biometric data is used and stored, and how individuals can be put at risk.