Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, and Prevention Methods

API2:2019 Broken User Authentication happens when an attacker bypasses an API’s authentication and authorization mechanisms and gains access to sensitive data or functionality that should only be available to authorized users.

Cloud Threats Memo: Cyber Espionage Campaign Using Remote Access Tools

Another day, another cyber espionage campaign exploiting two legitimate and well-known cloud services to deliver the malicious payload. Once again, this campaign was unearthed by researchers at Sentinel One, and it is aimed to distribute the Remcos Remote Access Tool (yet another example of a remote control tool used for malicious purposes) through the DBatLoader to target predominantly organizations in Eastern Europe.

Broken Object Level Authorization: API security's worst enemy

According to the Open Web Application Security Project (OWASP, 2019), broken object-level authorization (BOLA) is the most significant vulnerability confronting modern application programming interfaces (APIs). It can be exciting to pursue innovations in the API area, but while doing so, programmers must ensure that they are adequately attentive to security concerns and that they develop protocols that can address such concerns.

Salt Goes Gold Again, with Two Globee Cybersecurity Awards

Last week, three golds. This week, two more. Wow – the accolades keep coming. Salt took top honors in two Globee® Cybersecurity World Award categories: Hot Security Company of the Year for Security Software, and API Management and Security! You can read all the formal details in our announcement. We’ve earned five awards in the past two weeks, and the month isn’t even half over.

OptiXdashboard Cloud Management Tool - Manage Your Cloud Infrastructure with a Single Platform

In this video, we provide an overview of OptiXdashboard, a powerful hybrid cloud management tool that allows you to manage your entire cloud infrastructure with a single platform. Whether you are working with public or private clouds, OptiXdashboard can help you simplify and streamline your management tasks, providing you with greater visibility and control over your resources.

The Explosion of APIs and Nuances of API Security | Kashi (Co-founder & CTO, Fitbots)

Here are some highlights of the conversation between Kashi (Co-founder & CTO, Fitbots OKRs) & Venky (Founder & CMO, Indusface). They discuss how the API adoption growth will lead to an exponential increase in API security needs. Adopting multiple business services & securely integrating with them will be the future for running a sustainable long-term business. They cover a bunch of other aspects in the SaaSTrana Podcast, like: - API security with dynamic endpoints

Opti9tech Hybrid Cloud Solutions for Credit Unions

Opti9tech's hybrid cloud solutions are tailored to meet the unique needs of credit unions. With their flexible and scalable approach, Opti9tech offers a range of cloud-based solutions that can be customized to fit the specific requirements of each credit union. This includes a hybrid cloud solution that combines the benefits of both private and public clouds, providing maximum flexibility and cost-effectiveness.