Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Why the Gig economy is a key target for API attacks

The gig economy is thriving but it owes its success to the digital ecosystem it is built upon and Application Programming Interfaces (APIs) in particular. The real-time services we associate with platforms such as Uber, Lyft, and Fiverr all use APIs to enable seamless interactions between users, gig workers, and service providers. But APIs are […]

Root and stem: Eliminating vulnerabilities at the source with code auditing

The development security operations employed by most organisations are no longer as effective or efficient as they need to be. Too many of the current solutions used are still resulting in vulnerabilities slipping through the net and being shipped as part of final products. While most can be remedied with post-launch patches and updates, by […]

Why effective fraud prevention requires contact data quality technology

Fraud poses a big and growing danger for any organisation. Recent research by Ravelin backs this up by revealing that 75 per cent of businesses globally experienced an increase in online fraud over the last 12 months, with 84 per cent of organisations in the UK confirming growth in online fraud over this timescale – the most […]

Cybersecurity Awareness month: Security is a shared responsibility

These days, nearly all of us are consumers of applications and APIs. We interact regularly with websites and/or applications, whether they are financial, retail, insurance, travel, food, or otherwise in nature. What we may not realise when we go about our daily business, however, is the extent to which attackers and fraudsters are motivated to […]

Navigating the rising tide of DDoS attacks 

This year’s Cybersecurity Awareness Month highlights the theme “Being Smarter than the Hacker” as businesses face mounting cyber risks. Among the most pressing cyber risk concerns for businesses are distributed denial-of-service (DDoS) attacks, which have surged dramatically in frequency, magnitude, and complexity.   Data recorded by GTT indicates a troubling 25% increase in multi-vector DDoS attacks during the first […]

The path of least resistance to Privileged Access Management 

Privileged Access Management (PAM) has been around for more than 20 years taking critical accounts and putting them into a vault to ensure only select individuals could access them securely. Since then, PAM has evolved and now focuses on controlling the access itself which means preventing broad access to specific data and providing insight into […]

Five cybersecurity priorities for our new global governments

2024 was dubbed “the election year” by TIME Magazine – a simple yet accurate description. From the UK’s general election earlier this summer, to the upcoming presidential election in the US in November, and the other 62 countries (at least) voting this year, it is time for governments to really make an impact. When it […]

Data Resilience and Protection in the Ransomware Age

Data is the currency of every business today, but it is under significant threat. As companies rapidly collect and store data, it is driving a need to adopt multi-cloud solutions to store and protect it. At the same time, ransomware attacks are increasing in frequency and sophistication. This is supported by Rapid7’s Ransomware Radar Report 2024 which states, […]

 A Roadmap to Modern Application Security

A decade ago, Silicon Valley venture capitalist Marc Andreeson famously declared that “software is eating the world.” A bold statement at the time. But it has since become clear that Andreeson was right. Software is now ubiquitous – and it touches nearly every aspect of our lives. Today’s shift to software has had a profound […]

Final countdown to NIS2: How ISO 27001 accreditation can be a key ally in achieving compliance

In today’s fast-paced business environment, technology is central to enterprise success, often underpinning efficiency, innovation and competitiveness. From advanced data analytics to cloud-based models, modern companies are now leveraging a wide range of digital tools to boost productivity and streamline operations. That said, firms need to consider several factors to ensure that technology is a […]