Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

GoTestWAF - Quick start with Docker and PDF report

GoTestWAF is a tool for API and OWASP attack simulation that supports a wide range of API protocols including REST, GraphQL, gRPC, WebSockets, SOAP, XMLRPC, and others. It was designed to evaluate web application security solutions, such as API security proxies, Web Application Firewalls, IPS, API gateways, and others.

The IT Hour | The Latest on Android 03.15.24

Sergey Belous, Product Manager, tells us about all the cool new updates to JumpCloud's Android management capabilities. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable. You can expect from our weekly conversations.
Featured Post

Utilities and Energy a Prime Target For API Security Incidents

As a critical element of national infrastructures worldwide, the energy and utilities sector literally keeps the lights on in today's world. When water, gas, or electricity is cut off from businesses and families, it can have catastrophic consequences. To improve resilience and guarantee service uptime, energy and utilities companies know that digitisation is key to transforming the services they deliver, but aging technology stacks, a lack of interoperability and collaboration, and poor security hygiene are all limiting progress.

Advantages of Private LLMs - A Data Protection Perspective

In the busy domain of artificial intelligence (AI), the emergence of Private Language Model Models (LLMs) marks a pivotal development in addressing the escalating concerns surrounding data protection. As organizations harness the power of AI to glean insights and streamline operations, the need for safeguarding sensitive information has become more pronounced than ever.

Implementing the NIST Cybersecurity Framework (CSF) 2.0 with AI augmented API Security

The updated NIST Cybersecurity Framework (CSF) 2.0 was published February 26, 2024. Previously, this content was also known as the “Framework for Improving Critical Infrastructure Cybersecurity.” As stated in the framework: In summary, the updated NIST Cybersecurity Framework is organized into the following functional categories.

How To Protect Yourself From AI Voice Scam Calls

Artificial Intelligence (AI) being used to carry out cybercrime isn’t new, but as AI becomes more advanced, so do the tools that cybercriminals are using. One of the most recent AI-enabled cyber threats we’ve seen is cybercriminals using voice-cloning technology to carry out scam calls. You can protect yourself from AI voice-cloning scam calls by blocking spam calls, not picking up calls from unknown numbers and creating a safe word with your family in case a legitimate emergency occurs.

IoT Penetration Testing: How to Perform Pentesting on a Connected Device

IoT pentesting, also known as IoT penetration testing, is a process of assessing the security vulnerabilities of IoT devices and networks. The purpose of IoT pentesting is to identify weaknesses in the system that could be exploited by attackers and to suggest remediation measures to enhance the overall security of the IoT infrastructure. The process of conducting a successful IoT penetration test involves several steps.

Keeper 101 - How to Share a Keeper Record on iOS

Keeper’s iOS mobile app makes it easy to securely share records with friends and family. To share a record with another Keeper user, select the record from your vault and tap Share, then Share with User. Enter the user's email address or select it from the dropdown, then use the toggle buttons to choose what permissions the user will receive such as: “Can Edit”, “Can Share” and "Make Owner". If you do not enable any permissions, the user will have “view only” access.

Navigating the Maze: Overcoming Security Issues in IoT

Security issues in IoT are a pressing concern as the number of connected devices skyrockets. What vulnerabilities are these devices exposed to, and what can be done to secure them against escalating cyber threats? This article provides a no-nonsense overview of the inherent risks in the IoT landscape and the steps necessary to maintain the integrity and safety of IoT ecosystems.

Keeper 101 - How to Set Up and Use KeeperFill on iOS

KeeperFill is Keeper’s powerful, autofilling feature that works across all devices and instantly logs you in to websites and apps, saving you both time and effort. Keeper is fully integrated into the login experience of every website and app through the Passwords button that appears above your device's keyboard. To utilize this feature you need to first perform a few setup steps.