Information Security Media Group asked some of the industry's leading cybersecurity experts about the trends to watch in 2023. Responses covered a variety of emerging threats and evolving trends affecting security technologies, leadership and regulation. Here is a look at the year ahead.
A member of a criminal data breach forum says he's selling email addresses and phone numbers of 400 million Twitter users. If verified, the data breach would be a further blow to Twitter and its beleaguered chief executive as regulators increase pressure over the firm's security practices.
Observability is not necessarily a commonly understood term in cybersecurity circles. What exactly does it mean in context, and how does it relate to security? Jackie McGuire of Cribl discusses the observability pipeline and how best to build a solution.
It's been another watershed year for cybersecurity practitioners and leaders. How would one describe the state of security and data as we head into 2023? Jackie McGuire of Cribl weighs in with her observations and predictions for the new year.
APIs increasingly drive everything from web and mobile application development to IoT devices since they streamline communication among disparate systems, says Synack CEO Jay Kaplan. But testing the efficacy and security of APIs remains challenging given the size of API endpoints.
Approov has landed a new CEO to help the mobile security upstart expand in the United States and capture more healthcare and financial services customers. The Silicon Valley-based company has captured high-profile European customers such as BMW from its development center in Scotland.
Serverless adoption is rising rapidly. Recently, AWS released a new feature called Lambda function URLs. This feature enables configuring HTTP endpoints, to directly invoke lambda functions, without going through AWS API Gateway and other infrastructure. This means that other AWS services do not have to be provisioned...
Information amassed on 5.4 million Twitter users by an attacker who abused one of the social network's APIs has been dumped online for free. While Twitter confirmed that breach, a researcher suggests other attackers also abused the feature to amass information for millions of other users.
Insanity in cybersecurity is trying the same failed approaches and hoping for different results. As new CSO at Traceable, Richard Bird wants to stop the insanity and bring a new, non-intrusive approach to defending the digital crown jewels - especially API.
In this eBook Transcript with Information Security Media...
When it comes to APIs, the challenge isn’t always obvious, and the attack types are more insidious. Most organizations simply do not know their current API inventory, and this is a major problem.
The reality – there are thousands of APIs in organizations, running on multiple clouds, and they are growing...
Join Immersive Labs Appsec Experts, Mat Rollings and Kev Breen, as they discuss the latest threats and vulnerabilities affecting APIs in web applications.
Insanity in cybersecurity is trying the same failed approaches and hoping for different results. As new CSO at Traceable, Richard Bird wants to stop the insanity and bring a new, non-intrusive approach to defending the digital crown jewels - especially API.
The steady barrage of acquisition reports around publicly traded digital experience vendor Akamai has intensified in recent weeks. The latest salvo landed Monday when StreetInsider reported that the intelligent edge platform provider held talks with a private equity firm about a potential takeover.
What existing security tools can and can’t do to protect your APIs? APIs are built to facilitate innovation and bring the right data to the right people in milliseconds. However, APIs have also become the number one attack vector of bad actors. Why? Because it doesn’t take a lengthy, sophisticated attack to do...
API security is the new frontier for government entities trying to respond
to adversaries taking advantage of the new, broadened attack surface. Yet,
agencies struggle to keep pace. Dean Phillips of Noname Security offers
insight on how to address the API security challenge.
In this ebook with Information Security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.