Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Harnessing the Power of eBPF for API Traffic Analysis with Salt Sensor 3.0

As API usage grows, so do the complexities of securing them. At Salt Security, we're constantly striving to stay ahead of the curve and bring you the best-in-class solutions for API traffic analysis. With that mission in mind, we are thrilled to announce the release of Salt Sensor 3.0.0, packed with exciting new features to enhance your ability to capture and analyze API traffic.

Major Database Security Threats and How to Prevent Them

Human nature tells us that we’ll go for the low-hanging fruit before climbing a tree. Since threat actors are (after all) human, the same applies to them. Since databases are particularly vulnerable to many lower-level attacks, they are constantly at high risk. From misconfiguration to credential theft, these repositories of sensitive information can be preyed upon by even the most nascent cybercriminals.

Opti9 Receives AWS Resilience Competency

As of Monday, September 16th, Opti9 Technologies is proud to have achieved the AWS Resilience Competency, specialized in Resilience Recovery, recognizing our expertise in helping customers enhance the availability and reliability of their critical cloud workloads. As an AWS Resilience Competency Partner, our services are rigorously validated by AWS to ensure we meet the highest standards as an AWS Services Partner, and uphold the established expertise.

Board Responsibilities for Data Security and Privacy

Corporate boards are tasked with ensuring that sensitive information—ranging from intellectual property (IP) and end-user information to sales statistics—is handled securely. As data becomes an ever-more valuable asset, so too do the risks associated with mismanagement.

Proactive AppSec continuous vulnerability management for developers and security teams

What are some of the growing cybersecurity risks in the modern software development landscape that keep CISOs busy? Developers and security teams face an ever-increasing array of threats, from sophisticated open source and vendor-controlled supply chain attacks to vulnerabilities introduced by AI-generated code like prompt injection and poor code security by GitHub Copilot.

The 2024 Elastic Global Threat Report: Forecasts and recommendations

Yesterday, Elastic Security Labs released the 2024 Elastic Global Threat Report, a comprehensive look at more than 1 billion data points from Elastic’s unique telemetry. The report provides insights into the methods, techniques, and trends of threat actors from the perspective of defenders — giving crucial insights for security teams to prioritize and improve their security posture.

QR Code Security: How Businesses Can Keep Customers Safe

Do you want to make sure your QR code security practices are keeping your business and customers safe? If so, you're in the right place! QR codes (Quick Response codes) are barcodes that store data for people who scan them with their device, usually a smartphone. QR codes have many great uses, such as helping customers learn more about your products and making it easy for them to download your app.