APIs are quickly becoming the most popular attack vector

In this Help Net Security video, Shay Levi, CTO at Noname Security, discusses the findings from a recent API security report, which reveals a growing number of API security incidents, a concerning lack of API visibility, and a level of misplaced confidence in existing controls. Key findings include: 76% of senior security professionals experienced an […]

Continue Reading

Fine-tuning Germany’s cybersecurity strategy

Recently, Eileen Walther, Northwave’s Country Manager for Germany and specialized in information security, was elected the new Vice President of the Cyber Security Council Germany (Cyber-Sicherheitsrat Deutschland). Before joining Northwave, she was head of the Dutch High Tech Crime Team and strategic advisor at the German Federal Criminal Police Office (BKA – Bundeskriminalambt). The Cyber […]

Continue Reading

Cyber attackers view smaller organizations as easier targets

Attackers view smaller organizations as having fewer security protocols in place, therefore requiring less effort to compromise. This Help Net Security video showcases how compromise is significantly different for small businesses than for medium-sized and large enterprises. The post Cyber attackers view smaller organizations as easier targets appeared first on Help Net Security.

Continue Reading

API authentication failures demonstrate the need for zero trust

The use of application programming interfaces (APIs) has exploded as businesses deploy mobile apps, containers, serverless computing, microservices, and expand their cloud presence. Consequently, many APIs are developed and deployed very quickly, leading to the persistence of coding errors, with poor authentication practices numbering among the top offenses. APIs are stateless in nature, and any […]

Continue Reading

7 cybersecurity audiobooks you should listen to this year

Audiobooks have gained enormous popularity among book lovers for a variety of factors, including their convenience, which enables listeners to learn while running errands or traveling. Here’s a list of cybersecurity audiobooks that are worthy of your time. Cybersecurity: The Insights You Need from Harvard Business Review Author: Harvard Business Review This book brings you […]

Continue Reading

Average company with data in the cloud faces $28 million in data-breach risk

Hard-to-control collaboration, complex SaaS permissions, and risky misconfigurations — such as admin accounts without multi-factor authentication (MFA) — have left a dangerous amount of cloud data exposed to insider threats and cyberattacks, according to Varonis. For the report, researchers analyzed nearly 10 billion cloud objects (more than 15 petabytes of data) across a random sample […]

Continue Reading