Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Bridging the Gap Between Designers and Developers

Designing software is tough. Whether you’re a designer, a product manager, or an engineer, we all play a major role in what the end user gets their hands on. Perhaps one of the most critical pieces on the journey to making great software is the relationship between designers and developers. When software is done right, it’s easy, intuitive, and a joy to use. This is no accident - it’s very intentional and it often takes countless iterations to get products to look and feel great.

Lifting The Veil Of The Dark Web

See How Companies Arm Themselves With The Right Tools To Protect Against Threats From The Dark Web. We've all seen what's possible with the Dark Web thanks to Silk Road. If you're interested in buying or selling someone's personal data, such as credit card or social security information, it’s disturbingly easy to do. All you need is a computer and the Tor Browser, and it's all completely anonymous.

Politician Amongst Those Who Had Their Direct Messages Accessed During Twitter Hack

More information has emerged related to last week’s attack which saw a number of high profile Twitter accounts hijacked for the purposes of spreading a cryptocurrency scam. Twitter has already said that 130 Twitter accounts were targeted by hackers, using tools that should only have been available to the site’s internal support team.

Introducing Pizzly - the OAuth Integration Proxy

At Bearer, the whole team is focused on helping developers that rely on third-party APIs. In 2019, our engineers developed a solution that eased the integration with any API that uses OAuth as the authentication method. By handling both the authentication strategy (with refresh tokens) as well as proxying the request, it saved hours of engineering time when working with API integrations.

OneDrive for Business: Getting Administrator's Access to User's Files and Folders

OneDrive for Business is a secure cloud-based solution for convenient telecommuting, remote access and private file sharing. Indeed, files stored on OneDrive are private by default: Users control access to the files they upload, so they can be seen by other employees only if they have been shared by the OneDrive owner. Even users with Global Administrator access cannot access files unless the OneDrive account holder has granted them the appropriate permissions.

Attack surface analysis explained: The 7 deadly vectors for web application attacks

Modern web applications are complex, it is often made up of many layers where potential flaws could appear making it hard to secure. That’s why it’s important to understand the key attack vectors hackers use to spot entry points and map your attack surface during reconnaissance and work back from there to protect your web application footprint.

What is FFIEC-CAT?

There has been a significant rise in the number and complexity of Cybersecurity threats over the last several years in the financial services industry. Institutions have been in need of a tool that can aid in identifying all the different risk types and how to develop a plan to be prepared for this continuously growing number of threats. Finally a tool has been developed for these intuitions, especially for Credit Unions.