Can AI-assisted remediation reduce security debt?
Letting financial debt get out of control can be very dangerous. Making the required basic payments on a credit card monthly and avoiding debt collectors doesn’t solve the underlying issue: interest keeps accumulating, creating bigger issues over time. All kinds of debt accumulate interest over time, which then can create problems in the future. Unfortunately, […]
Teaching the Board to Talk to CISOs
Without a sense of context, the CISO cannot be expected to communicate meaningfully towards the Board You don’t have to go far online or on social media to come across articles analysing the difficulties CISOs have in communicating with the Board. The bulk of their argument revolves around cultural and language issues: In short, the CISOs don’t […]
Zero Trust Architecture: The Key to Securing Hybrid Environments
Hybrid environments have emerged as the new standard for today’s businesses, enabling them to retain agility and a start-up mindset as they expand and grow. According to Allied Market Research, the cloud-native applications market is expected to grow from $5.3 million in 2022 to a staggering $48.7 million by 2032. The same research tells us that […]
Why the Gig economy is a key target for API attacks
The gig economy is thriving but it owes its success to the digital ecosystem it is built upon and Application Programming Interfaces (APIs) in particular. The real-time services we associate with platforms such as Uber, Lyft, and Fiverr all use APIs to enable seamless interactions between users, gig workers, and service providers. But APIs are […]
Root and stem: Eliminating vulnerabilities at the source with code auditing
The development security operations employed by most organisations are no longer as effective or efficient as they need to be. Too many of the current solutions used are still resulting in vulnerabilities slipping through the net and being shipped as part of final products. While most can be remedied with post-launch patches and updates, by […]
Why effective fraud prevention requires contact data quality technology
Fraud poses a big and growing danger for any organisation. Recent research by Ravelin backs this up by revealing that 75 per cent of businesses globally experienced an increase in online fraud over the last 12 months, with 84 per cent of organisations in the UK confirming growth in online fraud over this timescale – the most […]
Cybersecurity Awareness month: Security is a shared responsibility
These days, nearly all of us are consumers of applications and APIs. We interact regularly with websites and/or applications, whether they are financial, retail, insurance, travel, food, or otherwise in nature. What we may not realise when we go about our daily business, however, is the extent to which attackers and fraudsters are motivated to […]
Navigating the rising tide of DDoS attacks
This year’s Cybersecurity Awareness Month highlights the theme “Being Smarter than the Hacker” as businesses face mounting cyber risks. Among the most pressing cyber risk concerns for businesses are distributed denial-of-service (DDoS) attacks, which have surged dramatically in frequency, magnitude, and complexity. Data recorded by GTT indicates a troubling 25% increase in multi-vector DDoS attacks during the first […]
The path of least resistance to Privileged Access Management
Privileged Access Management (PAM) has been around for more than 20 years taking critical accounts and putting them into a vault to ensure only select individuals could access them securely. Since then, PAM has evolved and now focuses on controlling the access itself which means preventing broad access to specific data and providing insight into […]
Five cybersecurity priorities for our new global governments
2024 was dubbed “the election year” by TIME Magazine – a simple yet accurate description. From the UK’s general election earlier this summer, to the upcoming presidential election in the US in November, and the other 62 countries (at least) voting this year, it is time for governments to really make an impact. When it […]