In conjunction with a new report from CyberEd.io, Information Security Media Group asked some of the industry's leading cybersecurity and privacy experts about 10 top trends to watch in 2024. Ransomware, emerging AI technology and nation-state campaigns are among the top threats.
A recently spotted hacking group with a penchant for using open-source tools has been using a less-than-novel tactic: exploiting SQL injection flaws. So warn researchers who recently detected attacks by the group, which has the codename GambleForce and appears to focus on gambling and retail firms.
Zombie APIs are becoming more common, just because of the sheer number APIs and third-party vendors that organizations rely on. Joshua Scott, head of information security and IT at API platform Postman, says businesses need to identify "what is critical to the business and map backward."
In the latest weekly update, the former federal CISO, Grant Schneider, joins three editors at ISMG to discuss important cybersecurity issues, including advice for the next White House cyber director and liability concerns facing CISOs following SolarWinds and its CISO being accused of fraud.
In today's interconnected world, cybersecurity is a critical concern for organizations across Asia Pacific. Cloudflare's 2023 survey sheds light on the current cybersecurity landscape in the region, revealing the increasing frequency of attacks and the need for enhanced preparedness.
In this insightful study, we...
Securing the web applications and APIs that underpin modern cloud architectures is a continually evolving challenge for security professionals. The technology is always changing, and almost all existing web security solutions lack the coverage your teams need.
Palo Alto Networks is tackling this problem head-on...
A ransomware attack can be extremely expensive for victims and can cost them over $700,000 to recover.
A Research suggests that in 2020, a new organization will be hit by ransomware every 14 seconds.2 In the future, ransomware as a service is expected to rise quickly as well, making ransomware an even bigger...
Standard Chartered nexus needed a unified analytics platform to support security analytics, DevOps, customer experience, and more. It needed to be easy for technical and non-technical users.
Download this case study to read how they fulfilled those needs, including
Finding a cloud-native architecture that provides...
Gartner positioned Dynatrace highest in Ability to Execute and furthest for Completeness of Vision in the 2023 Magic Quadrant for Application Performance Monitoring and Observability.
Observability and security are essential components of successful transformation strategies.
But innovating, operating...
APIs are susceptible to various security threats and vulnerabilities, but by adopting robust API runtime protection strategies, organizations can mitigate risks and ensure the ongoing availability, integrity and confidentiality of their APIs. Here are five reasons to provide APU runtime protection.
APIs have become increasingly popular as they are used to connect different systems, services and applications. But this makes them an attractive target for cybercriminals who want to exploits flaws and access sensitive data. Here are five critical reasons you need to conduct API security testing.
Large enterprises may have hundreds or thousands of APIs. Concerns over API vulnerabilities have been around for years, but most organizations outside of highly regulated industries such as banking have not taken the steps to understand the threats they face, said Richard Bird, CSO at Traceable.
To develop robust OT cyber security roadmaps and foundations, organizations with OT systems (everything from manufacturing process controls to building control systems to security access systems) should embrace the concept of OTSM (OT Systems Management), paralleling their ITSM practices, but within the unique...
Real-time protection against API attacks is nonnegotiable for the protection of any web application or digital service that relies on application programming interfaces. Here are some of the most common types of API attacks and strategies for protecting against them in real time.
Shadow APIs are up 900%, and API business logic abuse attacks have come to the forefront and are demanding both discovery and defensive measures from cybersecurity organizations, said James Sherlow, director of solution engineering in EMEA at Cequence Security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.