Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Five worthy reads: Hello from the dark side-the nefarious nature of voice AI technology

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we are exploring voice-activated AI technology that allows computers to comprehend and respond to human speech, while analyzing some of its detrimental drawbacks.

Realizing the True Power of Netskope Cloud Exchange

When I talk to customers and partners about Cloud Threat Exchange (CTE), I immediately say, “I’m not in marketing, and didn’t see the future—so I misnamed the module. I should have named it Cloud Data Exchange.” Why do I say this? Because, as Netskope and Cloud Exchange have matured, the number of use cases the module can fulfill has naturally grown beyond the initial vision. How so?

Cyber Hack: iPhone Theft

This blog is about the most recent iPhone theft that left users unable to access their Apple ID accounts when their iPhone had been stolen. As you may know, Apple devices such as the iPhone and iPad store sensitive information, including passwords, account credentials, and login details. This makes them especially vulnerable to cybercrime, since if the device is stolen or hacked into, your confidential information can be exposed.

How To Setup Velero Backups On EKS Using IAM Roles for Service Accounts (IRSA)

Velero is an open-source tool that allows you to backup and restore your Kubernetes cluster resources and persistent volumes. Velero backups support a number of different storage providers including AWS S3. The process of setting up Velero backup with S3 using AWS credentials has been documented by Velero here. However, at the time of this post, there is no official documentation on how to set up Velero using IRSA or IAM Roles for Service Accounts.

How Protecting Your APIs Protects Your Bottom Line

Several big-name API breaches have been in the news over the past few years, but API attacks happen every single day and typically don't make the headlines. Securing your APIs is no longer a luxury, but it’s also not just a burden. This short video shares how protecting your APIs opens the door to real business value.

The Cybersecurity Excellence Awards Trifecta - Earning Gold x3

It’s our own version of the triple crown! Salt Security has won gold in not one, not two, but three categories in the 2023 Cybersecurity Excellence Awards! It’s like being at the Oscars and winning Best Picture, Best Actor, and Best Director! Check out our award announcement! This year, Salt won highest honors for: Being recognized as the top solution for API security means a lot to our team.