Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Disparate Data to Unified Risk Insights: The Role of Asset Correlation in Vulnerability Management

In this webinar, Adam Dudley and Aaron Attarzadeh from Nucleus discuss the critical role asset correlation plays in vulnerability management. They dive into how organizations can unify disparate asset data to gain clearer, more actionable risk insights. They explore the challenges of managing vulnerabilities in today's complex environments, with a focus on metadata integration, asset correlation, and how to manage data from multiple scanners and sources.

API ThreatStats Report 2025: The Convergence of AI and API Security

This is it! The 2025 Annual API ThreatStats Report! The Wallarm Research team has collected and analyzed all the API threat data for 2024 and produced this annual report, shining a spotlight on the rising threat of API attacks targeting AI applications. The latest report explores the top API threats, identifies key trends, and provides actionable insights that can help you strengthen your API Security program, with an emphasis on identifying and protecting your AI applications from API security issues. This report includes an update to our dynamic API Security Top 10 as well. In this webinar, you will learn about.

Answers to FAQs About API Security with Wallarm #SQLInjection #APIAbuse #AttackExamples

Learn how Wallarm integrates with Kubernetes and psyllium for API security and observability using eBPF. Explore the differences between stateful and stateless attacks and real-world examples like SQL injections and API abuse. Discover why context is essential in defining attacks and how Wallarm adapts to various scenarios.

Reimagining the Role of the CIO in Business-led IT

This blog is a follow-up to the post Opportunities & Risks for Digital-first Leaders in Business-led IT The days of shadow IT as an unregulated threat are over. Business-led IT represents a fundamental shift in how organizations innovate and operate. To succeed in this new reality, CIOs must embrace what I call the “New CIO” mindset.

Assessing Your Readiness for SSE Implementation

Your workforce is remote or hybrid, logging in from their homes, coffee shops, or random public networks, using cloud-based applications. Your data is increasingly being stored in the cloud, accessed from anywhere, traveling to who-knows-where. And your security is lagging behind. More than 90% of organizations have moved assets to the cloud, yet legacy security solutions are too complex and ultimately inadequate to secure the digital transformation.

The Evolution of Fraud: How Deepfake Technology is Changing Cybercrime

As a former black hat hacker, social engineering and phishing concepts are not new to me. I have used these techniques in my previous life, so I know their effectiveness. Having spent years immersed in the intricacies of social engineering, I’m always looking for new twists on this age-old technique.

Weekly Cyber Security News 30/01/2025

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! I’m always fascinated by these low level side channel attacks. Though of course, if you are affected by them, then perhaps not so fascinating.