Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

A Comprehensive Guide to X-Powered-By Header

An X-Powered-By header is a type of HTTP response in the header field (most headers prefixed with an ‘X-‘ are non-standard) that informs the user which technology stack or framework is running on the web server. For example, if a web server is running Node.js, the header would be “X-Powered-By:Express”, which indicates an Express framework is being used.

Lost in Translation: Vulnerability Management Communication Gaps

Vulnerability management is absolutely critical to protecting an organization’s IT and cloud infrastructure, systems, or applications from incoming threats. The ability to remediate the most relevant vulnerabilities quickly is the only way to keep your perimeter safe. Yet, security teams struggle with managing vulnerabilities. Why? At the core lies a fundamental communication and collaboration problem.

Phishing is Still the Top Initial Access Vector

Phishing remains a top initial access vector for threat actors, according to researchers at ReliaQuest. Phishing and other social engineering tactics can bypass security technologies by targeting humans directly. “The enduring dominance of phishing as an initial access technique underscores its effectiveness and persistence in the face of cybersecurity advancements and more sophisticated methodologies,” the researchers write.

Cyber security measures for small and medium enterprises (SMEs)

The risk of cyber attacks for companies is increasing and can significantly disrupt their operations, have negative financial consequences and damage their reputation. Small and medium enterprises (SMEs) are especially vulnerable to these attacks due to limited resources and a lack of cyber security expertise. Understanding the significance of cyber security is crucial for protecting sensitive data and ensuring business continuity.

A CISO's Checklist For Securing APIs And Applications

Building a robust API and application security program is a key objective for security leaders in any market. But developing and maintaining an effective security program for your APIs and web applications requires: ‍- A deep understanding of the right approach to implementing API and application security.

A CISO's View on the State of API Security: Discussing the API ThreatStats Report, Q2 2024

API exploits represent one of the fastest growing threat vectors–a trend that will continue to accelerate as the increasingly AI-driven digital economy grows. Join veteran CISO and application security expert Mike Wilkes and Wallarm’s VP of Product, Tim Erlin, as they discuss the state of API security and where it is heading. Drawing upon their extensive industry experience as well as insights drawn from the Wallarm API ThreatStats Report Q2, 2024.

Introducing GitGuardian Software Composition Analysis (SCA)

Introducing GitGuardian Software Composition Analysis, further expanding the capabilities of our code security platform. You have long known GitGuardian for secrets detection and remediation, honeytokens, and IaC scanning. Now, with GitGuardian SCA, you can effortlessly scan your applications to detect known vulnerabilities introduced through both Direct & Transitive dependencies. The platform will automatically prioritize incidents depending on their context and help developers find the best path to remediating any issues.