Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

APIs: The Invisible Backbone of Digital Transformation

APIs: The Invisible Backbone of Digital Transformation In today's app-driven economy, APIs (Application Programming Interfaces) have become the foundation for innovation and connectivity. A10's security experts Carlo Alpuerto and Jamison Utter explore the explosive growth in API development and adoption across industries. These powerful interfaces now power everything from financial services and retail experiences to transportation systems, IoT devices, autonomous vehicles, and smart city infrastructure.

#213 - Building cybersecurity products with Jonathan Haas, Product at Vanta

On this episode of the Cybersecurity Defenders Podcast we speak with Jonathan Haas, Product at Vanta, about building cybersecurity products. Jonathan’s work focuses on making security compliance faster and more accessible, helping teams move from months-long processes to efficient workflows that take just days. Before Vanta, he was the co-founder and CEO of cybersecurity startup ThreatKey, and before that he held key roles at Snapchat, DoorDash, and Carta, where he built and refined compliance systems during times of rapid growth.

Brivo Access: How To Create a Schedule Exception

In Brivo Access, a schedule automates access control, eliminating the need for manual unlocking or locking of doors at specific times. A schedule exception temporarily changes the access permissions defined by the regular schedule. Exceptions are usually applied to specific dates or date ranges, such as holidays, special events, or temporary closures. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

CVE-2025-31650 - Apache Tomcat DoS Risk via HTTP Priority Header

The Apache Software Foundation has disclosed a high-severity vulnerability in Apache Tomcat that could let attackers exploit improperly handled Priority headers in HTTP/2 to cause a denial of service (DoS). Tracked as CVE-2025-31650, this flaw stems from improper input validation, specifically when the server handles malformed Priority headers in HTTP/2, resulting in memory leaks and potential OutOfMemoryExceptions.

Snapshot vs. Backup: Key Differences in Data Protection

Recent studies indicate that data loss incidents typically cost companies millions for damages and recovery efforts. The distinction between snapshots and backups remains poorly understood, yet they serve completely different functions when it comes to safeguarding your information assets. Snapshots offer quick point-in-time copies, while backups provide comprehensive, long-term data protection.

SolarWinds Hack: How State Actors Infiltrated & What You Can Learn #cybersecurity #solarwinds

State actors played the long game by targeting SolarWinds’ build server, injecting malicious code without detection. Learn why code diffs, hash checks, and decompiling builds are critical for cybersecurity today.

What Is Pretexting? Definition and Examples

Pretexting is a fictional story threat actors use to trick you into giving them access to sensitive information. It is a popular scam that can happen online or in person, and it uses common phishing techniques to help threat actors achieve success in their pretexting scam. In this article, we cover: what is pretexting, how it works, examples of pretexting, and how to prevent it by subscribing to Internxt Drive and by increasing your cyberawareness online. Ready to learn more? Then keep reading!

Tines Workbench Bootcamp

Join us for a special bootcamp exploring our universal AI copilot, Tines Workbench. Workbench is a Tines-powered AI chat interface where you can take action and access proprietary data in real-time, privately and securely. In this 45-minute session, get hands-on experience using Tines Workbench, learning how to combine the power of secure AI chat and enterprise workflows. You can view the bootcamp user guide here.