Wallarm Demo: Shadow API Detection

Find APIs Hiding in the Shadows

What’s hiding in the shadows?  It’s a well understood reality that unmanaged IT assets tend to be unmonitored IT assets, and that both introduce risk. Whether it’s a forgotten about application, or ...
cybersecurity framework south korea data protection officer CCO

U.S.-South Korea Forge Strategic Cybersecurity Framework

The United States and South Korea have crafted a “Strategic Cybersecurity Cooperation Framework.” The framework is part of recent bilateral accords intended to signal mutual adversaries and reaffirm the “ironclad commitment to ...
Security Boulevard
MOVEit ransomware, attacks

Defending Your Organization Against Ransomware

Every day, coordinated cybercriminal groups are developing more advanced skills to hack organizations’ networks. The number of ransomware attacks has increased significantly, and it’s getting easier for sophisticated cybercriminal gangs to access ...
Security Boulevard
BlackBerry Akamai DDoS

BlackBerry Report Surfaces Increasing Rate of Cyberattacks

A threat intelligence report published by BlackBerry found that from December 2022 through February 2023, 12 cyberattacks per minute were launched against organizations using the company’s cybersecurity software and services, with 1.5 ...
Security Boulevard
hacker ethics cloud ransomware attack

The Ethics of Selling Hacker Tools

With Indiana Jones about to enter the space race in the Dial of Destiny, I am reminded of the great Tom Lehrer’s 1965 song about former Nazi scientist Dr. Wernher von Braun’s ...
Security Boulevard
API Noname CrowdStrike data discovery supply chain zero-days fuzz appsec

Noname Security Aligns With Intel on API Security

Noname Security announced today it is working with Intel to offload application programming interface (API) security to network integration cards (NICs) based on 4th-gen Intel Xeon Scalable processors and the Intel NetSec ...
Security Boulevard
service mesh Deloitte Akamai Extends Security Services to the Enterprise

Akamai Report Surfaces Spike in Attacks Against Web Apps and APIs

A report published by Akamai Technologies suggested that in addition to launching attacks against web applications, more cybercriminals are specifically looking to compromise application programming interfaces (APIs). Overall, the attacks against web ...
Security Boulevard
The Risks of Third-Party Vendors: A Gateway to Cyber-Attacks

The Risks of Third-Party Vendors: A Gateway to Cyber-Attacks

Understanding the Vulnerabilities and Safeguarding Your Business Against Cybercriminals by using Third-Party Vendors ...
microservices

5 Ways to Reduce the Attack Surface for Microservices

Microservices is a software development approach where an application is divided into small, independent and loosely coupled services that work together to provide the application’s overall functionality. Each microservice is designed to ...
Security Boulevard
MITRE Splunk DLL sideloading ransomware Iran cybersecurity attack Security

Splunk: Cybersecurity Dynamics Rapidly Changing

A survey of 1,520 cybersecurity and IT leaders published today found more than half (52%) reporting their organization suffered a data breach in the past two years, with 62% experiencing monthly unplanned ...
Security Boulevard