Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Salt Illuminate: API Security That Works in Minutes, Not Months

APIs are the backbone of modern business. They connect services, power user experiences, and enable innovation at breakneck speed. But they’ve also become one of the largest, most complex threat surfaces out there—and traditional security approaches just aren’t cutting it. At Salt Security, we’ve spent years pioneering API protection. And today, we’re thrilled to announce our biggest leap forward yet. Meet Salt Illuminate.

ConnectWise Breach Attributed to Nation-State Threat Actor

On May 28, 2025, ConnectWise published an advisory disclosing suspicious activity within its environment, attributed to a sophisticated nation-state threat actor known for intelligence collection. The activity reportedly affected a very small number of ScreenConnect customers, all of whom ConnectWise has directly contacted. Details remain limited as the investigation is ongoing.

OWASP API Cheat Sheet - From Developer Guidance to Executive Strategy

OWASP’s API Security Cheat Sheet is a familiar resource for many cybersecurity leaders—often bookmarked, rarely reimagined. But what if this seemingly developer-focused reference held the blueprint for executive-level strategy? For CISOs and CFOs operating in the era of digital ecosystems and financial APIs, this cheat sheet is not just tactical guidance—it’s strategic armor.

EU Regulating InfoSec: How Detectify helps achieving NIS 2 and DORA compliance

Navigating the complex and ever-changing compliance landscape is difficult for many companies and organizations. With many regulations, selecting the appropriate security tooling that aligns with the compliance needs of your business becomes a significant challenge.
Featured Post

Data Protection vs. Cyber Resilience: Mastering Both in a Complex IT Landscape

Today's always-on, hyperconnected world requires CIOs to confront two equally important concepts: data protection and cyber resilience. As reliance on data to fuel analytics, engineering, marketing, and other key operations increases, the complexity surrounding IT infrastructure grows in tandem. Hybrid workforces, edge computing, cloud-native applications, and legacy systems add further complexity to the mix.

Is Runtime Vulnerability Management the future of cyber risk management?

Traditional vulnerability management has hit a wall. The vulnerability management playbook hasn't changed much in decades: scan for CVEs, prioritize by CVSS scores and patch as quickly as possible. But this reactive approach is failing security teams who are drowning in alerts while real threats slip through the cracks. Runtime vulnerability management sets out to change this status quo. Here's what you need to know.

Search-Safe: Why SEO Should Be Part of Your Cybersecurity Toolkit

When most people hear the term "SEO," they think about getting more clicks, climbing up Google's ranks, and squeezing into that coveted top-three spot. It's all very performance-driven-and fair enough. But there's another side to SEO that gets overlooked: security.

How Cybersecurity Companies Are Closing the Gaps in Zero Trust Implementation

Zero Trust isn't just another cybersecurity buzzword-it's a fundamental shift in how organizations approach security. In a world where traditional perimeter-based defenses are no longer enough, Zero Trust flips the model entirely. Instead of trusting users and systems by default, it assumes every access request could be a threat until proven otherwise.

The Most Concerning CyberSecurity Statistics From Recent Data

If you've been paying attention to cybersecurity lately, it's hard not to notice just how fast the landscape is shifting. Threats that were once rare a few years ago are now occurring weekly-sometimes daily-and they're targeting larger targets with more severe consequences. It's not just about data theft anymore. Whole systems are being locked up, leaked, or dismantled in hours. The most recent statistics show just how aggressive and sophisticated these attacks have become, and 2025 is shaping up to be a pivotal year for digital security.