Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Seeing Your APIs Attack Surface Through an Attacker's Eyes: Introducing Salt Surface

Your API attack surface is larger and more exposed than you realize. In today's complex, cloud-native environment, APIs are deployed at an astonishing rate. While this rapid pace fuels innovation, it also creates a significant visibility gap. The APIs you are aware of and manage are only the tip of the iceberg. Your actual risk exists beneath the surface, in the undocumented, unmanaged, and forgotten APIs that traditional security tools completely overlook.

Security Starts at Home: Why Zero Trust Is Powering Leading Security Companies

If you’re a security vendor and you get breached, you’re not just another victim; you’re a failed promise. A broken fire alarm in a burning building. When Okta disclosed a breach in October 2023, its stock dropped nearly 11%, wiping out close to $2 billion in market cap in a single day – a stark reminder of how quickly trust evaporates.

What is Enterprise Identity Management?

By 2025, non-human identities (like service accounts, API keys, and bots) will outnumber human identities by 45:1 in cloud environments. Yet many organizations still rely on static IAM roles and manual provisioning, leaving them exposed to credential sprawl, insider risk, and compliance violations. That’s where modern Enterprise Identity Management (EIM) comes in. Enterprise software development is increasingly cloud native.

Symmetric Cryptography in Practice: A Developer's Guide to Key Management

Symmetric cryptography powers everything from HTTPS to JWT tokens, but key management remains a significant challenge. This developer guide covers three critical use cases—session keys, self-use keys, and pre-shared keys—with practical strategies for secure generation, rotation, and storage.

Introducing Keeper's Bidirectional One-Time Share

Keeper's upgraded One-Time Share solution enables two-way sharing between Keeper users and non-users, providing a secure way of exchanging confidential information and files. This new sharing technology builds upon the functionality of our existing One-Time Share feature. These shares are protected in transit by Keeper's elliptic-curve and AES-256 cryptography and can only be decrypted locally on the recipient's device.

Inside Today's Cyber Attacks: What We Can Learn from Ransomware Groups Like Scattered Spider

Cyber attackers like Scattered Spider are bypassing firewalls—using stolen credentials and social engineering to walk right in! Learn how these new threats exploit trust, target your help desk, and turn your processes against you. Discover why identity is now the new perimeter and what IT leaders must do to protect their organisations.