Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How Can Deliberately Flawed APIs Help In Mastering API Security?

In our recent webinar recent webinar title 'A CISO’s Checklist for Securing APIs and Applications', we delved into the concept of creating an API security playground tailored for both developer and security teams. The core idea revolves around utilizing intentionally vulnerable APIs as training tools. In this blog post, we'll present a curated list of such APIs, each with its own unique set of characteristics.

Understanding the Differences Between Fine-Grained vs Coarse-Grained Access Control

In the age of digital collaboration and cloud computing, access control is a critical security tool. It is crucial to ensure that only authorized users have access to the appropriate information in order to effectively manage security, adhere to privacy and industry regulations, and safeguard intellectual property (IP) for competitive advantage.

Verizon Settles for $16 Million Over TracFone Data Breach: New Security Measures Required

In a significant development in the realm of data security, Verizon Communications has agreed to a $16 million settlement with the Federal Communications Commission (FCC) following a series of data breaches at its subsidiary, TracFone Wireless. The breaches, which occurred between 2021 and 2023, have led to increased scrutiny on Verizon's data protection practices and will result in mandatory improvements to its security measures.

Navigating the Minefield: Cybersecurity for Non-Profit Organizations

Cybersecurity threats cast an ominous shadow over organizations across all sectors. While the world often associates these risks with profit-driven businesses, non-profit organizations are equally vulnerable targets. And the stakes are alarmingly high. Recent data shows that about 6 cyber-attacks happen every 4 minutes and attacks like the 2022 one on the International Committee of the Red Cross (ICRC) send shivers across non-profits.

CrowdStrike Outage: What Happened and How to Limit Future Risk

In the early morning of July 19, a software update to CrowdStrike’s Falcon sensor started to cause one of the most extensive IT outages in history, affecting several industry sectors, including financial services, healthcare, transportation, and others. According to CrowdStrike, the outage stemmed from “a defect found in a Falcon content update for Windows hosts.” At this point, the software update has not affected Mac and Linux systems.

Protect Your Privacy: Essential Tips for Social Media Security

In today’s connected world, our online presence is central to our lives like never before. We stay connected with our friends and family wherever they are through social media. Whereas in the past our social contact was limited to those who lived or worked nearby, now, through social media, we can connect with those with shared interests or beliefs anywhere in the world. Most of us use social media to stay in touch with those they care about.