Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

SaaS Security Best Practices for Modern Organizations

Most modern organizations run on SaaS applications, and many use them to store sensitive data. The global SaaS market reached a total value of $206 billion in 2023, and is expected to climb to $247 billion by the end of 2024. Organizations must employ a complex system of practices to keep their SaaS apps secure and their data safe. Because SaaS apps are delivered through the cloud, they must be managed and secured differently than other types of software.

API Attack Surface: How to secure it and why it matters

Managing an organization’s attack surface is a complex problem involving asset discovery, vulnerability analysis, and continuous monitoring. There are multiple well-defined solutions to secure the attack surface, such as extended detection and response (EDR or XDR), security information & event management (SIEM), and security orchestration, automation & response (SOAR); despite that, these tools often do not prioritize APIs.

How AI Impacts Reconnaissance and Bug Bounties

Is AI impacting security reconnaissance and bug bounties? Will AI be used by malicious actors in security research? These are just a few questions asked in this interview with NahamSec, in which we discuss AI in the coding and cyber security sector, how it can be used both positively and negatively, how it can impact the job market, and how it can be controlled to better serve the industry. Resources.

Making progress on routing security: the new White House roadmap

The Internet can feel like magic. When you load a webpage in your browser, many simultaneous requests for data fly back and forth to remote servers. Then, often in less than one second, a website appears. Many people know that DNS is used to look up a hostname, and resolve it to an IP address, but fewer understand how data flows from your home network to the network that controls the IP address of the web server.

AI Copilots and Developer Relations

Welcome to Cloud Unfiltered! In this episode, host Michael Chenetz is joined by Erika Dietrick, a Developer Advocate at Cisco DevNet, fresh off her experience at Black Hat and DEF CON in Las Vegas. Erika dives into the evolving world of AI and its practical applications in development, with a focus on AI coding assistants like GitHub Copilot. Together, they explore.

On-Prem and Kubernetes: A delicate relationship

In cloud security, context is everything. In the previous two installments of our Customers Care Chronicles, we wrote about how a security vendor needs to be a true business partner and the potential headaches when migrating tools in the cloud. In this installment, we tackle another non-security concept that happens to be crucial for security: environment.