Zombie APIs are becoming more common, just because of the sheer number APIs and third-party vendors that organizations rely on. Joshua Scott, head of information security and IT at API platform Postman, says businesses need to identify "what is critical to the business and map backward."
In the latest weekly update, the former federal CISO, Grant Schneider, joins three editors at ISMG to discuss important cybersecurity issues, including advice for the next White House cyber director and liability concerns facing CISOs following SolarWinds and its CISO being accused of fraud.
In today's interconnected world, cybersecurity is a critical concern for organizations across Asia Pacific. Cloudflare's 2023 survey sheds light on the current cybersecurity landscape in the region, revealing the increasing frequency of attacks and the need for enhanced preparedness.
In this insightful study, we...
A ransomware attack can be extremely expensive for victims and can cost them over $700,000 to recover.
A Research suggests that in 2020, a new organization will be hit by ransomware every 14 seconds.2 In the future, ransomware as a service is expected to rise quickly as well, making ransomware an even bigger...
Standard Chartered nexus needed a unified analytics platform to support security analytics, DevOps, customer experience, and more. It needed to be easy for technical and non-technical users.
Download this case study to read how they fulfilled those needs, including
Finding a cloud-native architecture that provides...
Gartner positioned Dynatrace highest in Ability to Execute and furthest for Completeness of Vision in the 2023 Magic Quadrant for Application Performance Monitoring and Observability.
Observability and security are essential components of successful transformation strategies.
But innovating, operating...
APIs have become increasingly popular as they are used to connect different systems, services and applications. But this makes them an attractive target for cybercriminals who want to exploits flaws and access sensitive data. Here are five critical reasons you need to conduct API security testing.
APIs are susceptible to various security threats and vulnerabilities, but by adopting robust API runtime protection strategies, organizations can mitigate risks and ensure the ongoing availability, integrity and confidentiality of their APIs. Here are five reasons to provide APU runtime protection.
Large enterprises may have hundreds or thousands of APIs. Concerns over API vulnerabilities have been around for years, but most organizations outside of highly regulated industries such as banking have not taken the steps to understand the threats they face, said Richard Bird, CSO at Traceable.
To develop robust OT cyber security roadmaps and foundations, organizations with OT systems (everything from manufacturing process controls to building control systems to security access systems) should embrace the concept of OTSM (OT Systems Management), paralleling their ITSM practices, but within the unique...
Real-time protection against API attacks is nonnegotiable for the protection of any web application or digital service that relies on application programming interfaces. Here are some of the most common types of API attacks and strategies for protecting against them in real time.
Shadow APIs are up 900%, and API business logic abuse attacks have come to the forefront and are demanding both discovery and defensive measures from cybersecurity organizations, said James Sherlow, director of solution engineering in EMEA at Cequence Security.
The rapid pace of API development has created major risk for companies given the amount of data that's being exposed, said Salt Security CEO Roey Eliyahu. The security industry hasn't adapted quickly to address these problems since it's still used to relatively static APIs that were easy to guard.
U.S. and Australian cybersecurity agencies are warning developers to guard against access flaws, saying that failure to institute authentication checks can lead to large data breaches. Broken access controls are on OWASP's 2021 list of the top 10 most critical security risks.
Attackers are increasingly using carefully crafted business logic exploits in which attackers effectively social engineer an API to do something it wasn’t intended to do, according to Stephanie Best, director of product marketing for API security at Salt Security.