Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

API Security Best Practice by GigaOm #apisecurity #apiattacks #apimonitoring #cybersecurity

In this video, we highlight the most critical criteria for effective API security, helping you understand what to prioritize in your security strategy. Learn how to evaluate and implement key API security measures to protect your organization from growing cyber threats.

Navigating SIEM Consolidation: Three Must-Ask Questions

Webinar presented by Devo and DeepSeas The market for Security Information and Event Management (SIEM) is in transition. Many top-tier SIEMs are now outdated, facing end-of-life scenarios, and unable to cope with today’s data needs. Market consolidation poses significant risks and challenges for security operations centers, including impacts on stability, pricing, and threat detection capabilities.

How Best to Configure Audit Detailed File Share

When enabled, the Windows security setting audit detailed file share keeps a detailed record of every time someone tries to access a shared file or folder on either the user’s computer or network. When a regular audit is configured, it logs only a singular event – which user or client is establishing a connection to which shared file or folder. A detailed audit records additional information about who is accessing the shared files and folders.

Hybrid API Security: The Best of Both Worlds

In API security, organizations frequently encounter a tough decision: whether to opt for the flexibility and scalability of a SaaS solution or the data control and privacy of an on-premises deployment. Salt Security's hybrid deployment option provides a solution that combines the advantages of a SaaS solution with the assurance of data privacy, offering the best of both worlds for organizations.

Building Better Use Cases for Your SIEM

Deploying a next-gen cloud-native security information and event management (SIEM) in your security operations center (SOC) is a big step in the right direction toward significantly improving your organization’s security capabilities. But once you have that state-of-the-art SIEM in your SOC, how do you get the most out of it? One key step is building and executing specific SIEM use cases designed to meet the particular needs of your organization.

Cybersecurity in 2024: Reflecting on the Past, Preparing for the Future

As Europe is returning from summer breaks, it is time to reflect on the first half of 2024 and look forward to the rest of the year. Ransomware attacks on hospitals, blue screens across the world crippling airline operations and other industries, deepfakes to sway opinion and possibly elections, deepfake social engineering tactics to extort significant amounts of money - so far the year has kept cybersecurity professionals busy.

Threat Actors Abuse URL Rewriting to Mask Phishing Links

Threat actors are abusing a technique called “URL rewriting” to hide their phishing links from security filters, according to researchers at Perception Point. Security tools from major vendors use URL rewriting to prevent phishing attacks, but the same technique can be abused to trick these tools into thinking a malicious link is legitimate.