Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Securing the Internet of Things: Understanding the Basics of IoT Security

The Internet of Things (IoT) is a network of interconnected physical objects that are embedded with different kinds of technology, such as sensors, processors, transceivers, or actuators. This technology allows IoT devices to collect and exchange data with each other over the internet or through dedicated wireless networks, enabling them to interact with the physical world in various ways. As the number of IoT devices continues to grow, so too does the need for proper security measures.

Featured Post

A First Look at the Updated OWASP API Security Top 10

As the pioneer in API security, Salt Security worked closely with the Open Web Application Security Project (OWASP) to help identify, define, and educate the security community about API security threats. In fact, Salt was a key contributor to the original OWASP API Security Top 10 list, released in 2019. The OWASP API Security Top 10 list has had a tremendous impact on the industry, increasing awareness and educating organizations on the fastest-growing API security threats. Given the significance of this list, Salt has been actively involved in the foundation's updated 2023 mapping. We are thrilled to see the publication of the initial release candidate.

Cloud Protect Overview

In today's world, more and more companies are moving their data to the cloud, but malware and cyberattacks still exist. Protegrity can help your company remain secure even as it explores different cloud environments. From SaaS applications to data stockpiles, Protegrity Cloud Protect simplifies the enforcement and management of data-security policies across disparate cloud systems and tools - all through one centralized solution.

The New Face of Fraud: FTC Sheds Light on AI-Enhanced Family Emergency Scams

The Federal Trade Commission is alerting consumers about a next-level, more sophisticated family emergency scam that uses AI that imitates the voice of a "family member in distress". They started out with: "You get a call. There's a panicked voice on the line. It's your grandson. He says he's in deep trouble — he wrecked the car and landed in jail. But you can help by sending money. You take a deep breath and think. You've heard about grandparent scams. But darn, it sounds just like him.

Ultimate Security Checklist to Launch a Mobile App in Mexico - iOS & Android

Mexico is a budding market for mobile apps. The total revenue generated by mobile apps is expected to surpass $2100 million by 2027 from just $1500 million in 2022. So, if you're an app developer and thinking of launching a secure mobile app in Mexico, you're making the right decision. However, it's not as easy as you may think. Navigating Mexican data privacy regulations can be challenging, but it's critical to ensure that personal information stays secure and is not misused.

What Generative AI Means For Cybersecurity: Risk & Reward

In recent years, generative artificial intelligence (AI), especially Large Language Models (LLMs) like ChatGPT, has revolutionized the fields of AI and natural language processing. From automating customer support to creating realistic chatbots, we rely on AI much more than many of us probably realize. The AI hype train definitely reached full steam in the last several months, especially for cybersecurity use cases, with the release of tools such as.