Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How API Security Works

APIs are now the top attack vector, facing 68% more threats per host and 16 times more DDoS traffic than traditional web apps. These findings come from the State of Application Security 2024 report, based on analysis of over 2 billion API attacks blocked by AppTrana WAAP. As APIs become critical to digital transformation, understanding how to secure them—beyond just authentication—is no longer optional.

Understanding AWS Cloud Security

When Amazon Web Services (AWS) initially launched in 2006, it offered the first compute, storage, and database cloud service that developers could build on. Over time, AWS became a fundamental cloud service provider as organizations started migrating to the cloud. As one of the three primary cloud services providers, AWS remains integral to most businesses.

See Falcon Privileged Access in Action

Adversaries exploit standing privileges to escalate access and move laterally. Watch to see how Falcon Privileged Access—powered by Falcon Identity Protection—enforces just-in-time access, delivering full visibility and real-time revocation to stop identity-based threats before damage is done. CrowdStrike protects across the full identity attack lifecycle to ensure only the right identities have the right access, at the right time.

HyperSOC-2o: The Game-Changing, Analyst-Validated Autonomous SOC

IDC, Gartner, and Cyber Research Analyst Francis Odum validate Torq HyperSOC-2o for establishing the important building blocks for achieving the autonomous SOC. The autonomous SOC is here. It is no longer a distant reality, it’s not a pipe dream, and it’s certainly not just another cybersecurity buzzword.

Why Your CMMC Service Provider Should be Fully FedRAMP Authorized

How Trustwave’s FedRAMP Authorization Removes the Burden of CMMC Federal Compliance from Clients Navigating the labyrinth that is the US federal procurement system, particularly for Defense Industrial Base (DIB) companies, can be difficult. Particularly when these organizations should meet specific cybersecurity compliance standards like Cybersecurity Maturity Model Certification (CMMC).

Take the fear out of phishing response: Lessons from Material Security

For modern security teams, phishing remains one of the most persistent and resource-intensive challenges their organizations face. But automating the detection and response to phishing attacks not only saves time, but also reduces errors and strengthens your organization's overall defense.

Brex's CISO Mark Hillick on avoiding tool bloat and learning from high-severity incidents

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Mark Hillick, CISO at Brex. Mark’s experience in the security industry spans more than two decades. He started out as a security engineer at Allied Irish Banks before advancing through companies like MongoDB to become Director and Head of Security at Riot Games. His book, The Security Path, features over 70 interviews with security professionals on their career journeys.