Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

7 Core Principles of an Effective Application Security Program

If you’re building software, chances are your environment looks nothing like it did a few years ago. Monolithic applications have given way to microservices. On-prem systems have migrated to multi-cloud. Waterfall has become agile, and developers are pushing code daily (sometimes hourly). Security, meanwhile, is still catching up.

A New Chapter for API Security: Introducing the Salt MCP Server

There are rare moments when the technology world takes a massive leap forward. Today is one of those moments. At Salt Security, we have always believed that APIs form the connective tissue of the modern enterprise. As AI accelerates the pace of business beyond anything we’ve seen before, a simple truth has become clear: The way we discover, understand, and secure APIs must evolve, or we will be left behind.

ARMO vs. Wiz: Bridging the Gap in Cloud Runtime Security

The recent news about Google’s multi-billion-dollar acquisition of Wiz has sparked widespread conversation across the cybersecurity world. Its price tag reflects its strong reputation, Wiz is a leader in Cloud Security Posture Management (CSPM) solution. Its strength lies in identifying potential risks before they impact your live environment.

Introducing The Human Threat Map: A Tool for Mapping and Defending the Human Perimeter

The cyber security perimeter has evolved many times over the years, and we’re now at a point in time where it is shifted once again. We have reached an era where defence is no longer just about protecting our networks, endpoints, cloud systems or SaaS applications, but about protecting our people. Attackers now target employees directly, relying on their ability to exploit human behaviour to gain access, rather than technical vulnerabilities.

BreachForums The Latest Updates

Originally Published May 15th 2024 Updated April 29th 2025 On May 15, 2024, the FBI and DOJ, working alongside international partners like the NCA and New Zealand Police, took control of one of the major dark web forums, BreachForums. This action came shortly after a significant data leak from the Europol portal surfaced on the forum. The site was then relaunched by ShinyHunters, but now appears to be offline again. Several copies/potential successors have emerged. See our analysis below.

The Dangers of Double and Triple Extortion in Ransomware Attacks

In the summer of 2024, a Russian ransomware gang launched an attack on a UK pathology services provider. However, the group didn’t just encrypt the organization’s data and demand a ransom. It exfiltrated data from more than 300 million patient interactions with the National Health Service (NHS), and when the victim organization refused to pay the hefty ransom, the group released all the stolen data on the dark web.

Raising the Security Bar: Essential Measures to Combat Emerging Cyber Threats

Cyber threats are evolving all the time, and the pace of advancement is increasing. From malware and ransomware attacks to increasingly sophisticated phishing techniques and zero-day exploits, threat actors are constantly working to find new ways to breach our defenses, so we need to take proactive steps to raise security standards and keep our organizations on the front foot in the fight against cybercrime. In this piece, we'll discuss some essential measures you can take to do this, highlighting best practices and security technologies that can enable you to build a more threat-resilient organization.

Why Every Business Needs a Secure Payment Gateway to Prevent Cyber Threats

Lots of businesses nowadays conduct at least a portion of their sales online, with many operating entirely online. As such, businesses use payment gateways to authenticate the customer's payment details and facilitate online transactions.

Why Growing Businesses Are Turning to Managed IT Services

When your business expands, you need to stay relevant as you navigate the digital landscape. So, how do you achieve this? The best approach is to partner with competent and reliable tech experts. Sometimes, your trusted in-house teams may struggle to support the ever-changing IT demands. This may result in inefficiencies and operational challenges. This is where outsourcing to a trusted service provider comes in. The team will offer IT solutions that involve round-the-clock system monitoring to address potential issues before they disrupt your day-to-day operations.

How New Technologies Are Redefining Disaster Recovery Strategies for SMBs

Disasters such as cyberattacks, hardware failures, and natural calamities can easily derail your small or mid-sized business operations. The shield between a company and these types of threats is having a solid disaster recovery (DR) plan. As outlined by the Federal Emergency Management Agency (FEMA) of the U.S., about 25% of small businesses never recover from a great disaster. This heightens the stakes considerably. Thankfully, innovative technology is revamping disaster recovery by offering quicker, more intelligent, and economical ways to protect an enterprise.