Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why is API security the next big thing in Cybersecurity?

APIs, formally known as application programming interfaces, occupy a significant position in modern software development. They revolutionized how web applications work by facilitating applications, containers, and microservices to exchange data and information smoothly. Developers can link APIs with multiple software or other internal systems that help businesses to interact with their clients and make informed decisions.

Wi-Fi 6 or 5G? You no longer need to choose between the two to be protected

Fast, low-latency, high-capacity networks are needed in today's environment. However, these advanced networks face a significant challenge: combining speed, reliability, and flexibility with security. Until recently, much debate has been about which technology was better for protection purposes. There seemed to be a constant battle between users who saw more advantages in Wi-Fi 6 and users who preferred 5G networks.

2023 Business Email Compromise Statistics

In cybersecurity, knowledge is everything. From APT intelligence to zero-day vulnerabilities, relevant and timely information can be the difference between a thwarted attack and a total disaster. With Business Email Compromise (BEC) attacks at their zenith, there has never been a better time for a comprehensive BEC report. As such, Fortra has released its 2023 BEC Trends, Targets, and Changes in Techniques Report.

Submit Your Incident Feedback Directly In The GitGuardian Dashboard

GitGuardian is making it easier and safer than ever to gather feedback about secret leakage incidents. We have added a feedback form directly to the GitGuardian dashboard incident detail view, allowing your team to provide more info about the incident, including confirming if it's an actual secret, if it gives access to any sensitive info, if it has been revoked, as well as any other relevant details.

Tackling your Cybersecurity weak point: Your Supply Chain

The suppliers are the weak point in the security organization, 62% of attacks were through suppliers..... Existing tactics such as periodic pen testing, questionaires etc. don't cut it! Find out who your suppliers are, how healthy their protection is, how targeted they are AND be notified when an issue happens.

'Cyber' Security - must become a board level issue in the UK ...really?

The UK Government is "committed to helpingreduce vulnerability to attacks and ensure that the UK is the safest place todo business" . One strand of the strategy was an executivebriefing on cyber security to UK businesses – which included a top 10 focusareas for businesses to concentrate on. Within that briefing document, Ian Lovain(The Diretor of GCHQ) put it most frankly, "Value,Revenue and Credibility are at stake. Don't let cyber security become theagenda – put it on the agenda" .

Dark AI tools: How profitable are they in the underground ecosystem?

Threat actors are constantly looking for new ways or paths to achieve their goals, and the use of Artificial Intelligence (AI) is one of these novelties that could drastically change the underground ecosystem. The cybercrime community will see this new technology either as a business model (developers and sellers) or as products to perpetrate their attacks (buyers).