Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Harnessing the Power of eBPF for API Traffic Analysis with Salt Sensor 3.0

As API usage grows, so do the complexities of securing them. At Salt Security, we're constantly striving to stay ahead of the curve and bring you the best-in-class solutions for API traffic analysis. With that mission in mind, we are thrilled to announce the release of Salt Sensor 3.0.0, packed with exciting new features to enhance your ability to capture and analyze API traffic.

Opti9 Receives AWS Resilience Competency

As of Monday, September 16th, Opti9 Technologies is proud to have achieved the AWS Resilience Competency, specialized in Resilience Recovery, recognizing our expertise in helping customers enhance the availability and reliability of their critical cloud workloads. As an AWS Resilience Competency Partner, our services are rigorously validated by AWS to ensure we meet the highest standards as an AWS Services Partner, and uphold the established expertise.

Complying with the EU's New AI Act: A Guide to Staying Ahead

Artificial intelligence (AI) is increasingly embedded in modern organisations—from standalone generative AI apps to AI copilots in popular SaaS platforms, and the integration of self-hosted or public large language models (LLMs) in private applications tailored to specific business needs. The recently introduced EU AI Act sets out to regulate AI development and usage, ensuring that AI systems are safe, ethical, and respect fundamental rights.

CrowdStrike Empowers DevSecOps Teams to Strengthen and Streamline Cloud Security

Support for cloud security posture management (CSPM) misconfigurations: Our enhanced CSPM tools vigilantly monitor cloud infrastructures for misconfigurations, compliance violation and security gaps, providing complete visibility into security posture early in the development cycle and saving SecOps teams time.

How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack

Since early September, Cloudflare's DDoS protection systems have been combating a month-long campaign of hyper-volumetric L3/4 DDoS attacks. Cloudflare’s defenses mitigated over one hundred hyper-volumetric L3/4 DDoS attacks throughout the month, with many exceeding 2 billion packets per second (Bpps) and 3 terabits per second (Tbps). The largest attack peaked 3.8 Tbps — the largest ever disclosed publicly by any organization. Detection and mitigation was fully autonomous.

Secure Cloud Access with Wiz & CyberArk: Enhance Multi-Cloud Security at Cloud Speed | CyberArk

Discover how the powerful integration between Wiz and CyberArk enhances cloud security by identifying and controlling excessive cloud privileges. In this demo, you'll see how Wiz flags risky access, while CyberArk applies just-in-time privileged access for secure administrative operations in multi-cloud environments. By leveraging the principle of least-privilege, CyberArk's Secure Cloud Access ensures all sessions are monitored for compliance and audit without slowing down your cloud development.

API Gateways and API Protection: What's the Difference?

Modern businesses are increasingly reliant on APIs. They are the building blocks facilitating data exchange and communication between disparate systems. Because of their prevalence and importance, they are also under attack by actors exploiting vulnerabilities and misconfigurations. Unauthorized access, data exposure, injection attacks, broken authentication, DoS attacks, shadow or unmanaged APIs, insecure API dependencies, and more present a real risk to APIs and the organizations that use them.

Going beyond reachability to prioritize what matters most

Most modern applications contain a substantial number of open source packages, libraries, and frameworks. In fact, it's estimated that at least 80% of the source code in modern applications is from open source. In addition to relying heavily on commodity components to build applications, development teams often deploy these apps and services via community-sourced container base images.

The importance of CSPM inventory

Almost all organizations either rely on cloud computing or are planning to adopt cloud computing technologies soon to ensure their businesses remain competitive and gain an edge over the competition. As businesses increasingly rely on cloud services to manage their operations, the complexity of these environments continues to grow, introducing new challenges in maintaining security and compliance. This is where Cloud Security Posture Management (CSPM) comes into the picture.

Securing the Future: Extending Privileged Access to IoT and OT Devices through Strategic Partnership

In today’s hyperconnected world, the proliferation of Internet of Things (IoT) and Operational Technology (OT) devices has dramatically transformed industries, driving innovation, efficiency, and automation. However, as organizations continue to adopt these devices, the security landscape has become increasingly complex. Traditional IT security measures often fall short of safeguarding these critical assets, leaving them vulnerable to cyber threats.