Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

API Security for AI Driven SaaS Companies & Security Daily Gym | Kashi (Co-Founder & CTO Fitbots)

In this podcast, Kashi (Co-founder & CTO, Fitbots OKRs) discusses with Venky how AI-based SaaS organizations can secure their APIs with the help of dynamic endpoints. He even shares about his life as a CTO, where he spends a short time on security but still maintains the highest security standards with the help of a Daily Security Gym! With 15+ years of corporate experience, he has followed some consistent security practices over the years and discusses them in detail.

Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report

Threat actors will always target the things most important to businesses, and today, that means applications–the lifeblood of the global economy. As the recent Mend Open Source Risk Report reveals, the ongoing rise in open source vulnerabilities and software supply chain attacks presents significant business risk. The number of open source vulnerabilities are growing, just as threat actors are launching increasingly sophisticated attacks.

The Biggest Cloud Security Challenges in 2023 and How to Avoid Them

With the rapid growth of cloud technology, it is no surprise that security has become a major concern for organizations. Cloud computing provides numerous advantages in terms of cost savings and scalability, but these benefits come with risks. As businesses move to the cloud, they must be aware of the potential security threats and take appropriate steps to protect their data and systems from malicious actors.

Eight Things to Consider if You're Considering ChatGPT

Since ChatGPT was released by OpenAI last year, large language models like it have gone viral. Cheerleaders extol these AI models as the future of work, maybe the best thing to happen since the invention of the internet, or as the invention that changes everything. Detractors point to their gaffs, failures, and “hallucinations.” Both Google and Microsoft have been embarrassed in the last several days by the outputs of their respective chatbots.

Detecting AI-generated phishing emails with Egress Defend

With the launch of ChatGPT, concerns have been growing around the use of AI in phishing. The concerns are founded: AI can write phishing emails. It’s not the only tool in a hacker’s toolkit either - cybercriminals can use many different technologies to build a phishing campaign and send phishing emails. Many, like chatbots, are widely available for consumer and business use.

ChatGPT as your Falco Consultant

Can OpenAI ChatGPT become a contributor for an open source project like Falco? Is this the end of GitHub Copilot? ChatGPT is SO trendy that I overheard my grandma talking about it to her friends the other day. We’re seeing more and more uses of this AI for real world applications. That made us think… Falco, the first runtime security project to join CNCF as an incubation-level project, needs contributors.

Create AWS Honeytokens easily to catch hackers

learn how to create AWS Honey Tokens that alert you when someone attempts to use them. Honey tokens are API or access keys that are real but harmless and can be used as an early warning system to know when an intruder has made it into your system. In this video, we run through the simple steps to be able. to create your very own AWS Honey Tokens using an open-source project and all your own infrastructure.

How an Automated Onboarding API Can Streamline Your Business Processes

Definition: Automated onboarding is a process designed and scripted before user onboarding. It is an entire user or customer onboarding process that doesn’t require real-time human interaction and is frequently supported by in-app messages and instructions that are specifically created to ensure a positive onboarding experience and, therefore, customer satisfaction.