Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API

Bank Account Verification: The Benefits of Using Bank Account Verification APIs

When a consumer opens a bank account, the bank goes through a procedure called bank account verification. It enables all required checks to be made on the account user and the source of their income, successfully stopping illegal activities like money laundering and the financing of terrorism. In this post, we’ll examine how to validate a bank account and its owner, as well as the legal considerations that must be made while validating a client’s bank account.

Securing API Keys: A Guide for Analysts and Engineers

API keys are unique identifiers that enable developers to access and interact with an application's data and services. They act as a bridge between applications, allowing them to share data and functionality. In today's digital world, API keys are increasingly important as they facilitate seamless communication between various applications and services.

Latest Salt Accolades - Customer Award + Cyber 66

I’m excited to share the latest evidence of Salt leadership in API security, with two powerful tributes. First – Salt Security has been honored as winning the “Peace of Mind” category during the first-ever Ally Technology Partner Awards! Ally Financial, the nation’s largest digital-only bank and leading auto finance company, highlighted five suppliers for their outstanding service excellence across a broad array of criteria.

Understanding the NIS2 Directive: What it Means for Your Business and How to Secure Your APIs

In recent years, cybersecurity threats have become increasingly common and sophisticated, posing significant risks to individuals, businesses, and governments. In response to these threats, the European Union (EU) has introduced the NIS2 Directive, a new legislation focused on improving cybersecurity across the EU.

Can we prevent a security incident like Loom's?

On March 7, 2023, Loom experienced a security incident caused by a settings change in their CDN. Even with extensive internal testing, the nature of the problem caused it to go unnoticed until the change landed in production. Their incident report is a great explanation of the issue itself, so I won't reiterate much of it here, but what I will look at is a related issue, and how static code analysis tools integrated into development pipelines could have prevented the issue.

A Former FBI Agent's Thoughts: National Cybersecurity Strategy

The government just released its new National Cybersecurity Strategy built around five pillars: I have many thoughts and inputs on each of these pillars and will address them in individual installments to keep them easily digestible. I believe vigorous debate on these issues is important so we can achieve the best possible outcomes in each of these lines of effort. Implementing strategy is when the hard work begins and the stakes couldn’t be higher with this topic. We have to get it right.

Financial Services Firms: Address FFIEC's Stringent API Security Regulations with Noname Security

Financial services companies are a favorite target for threat actors. Most of us are familiar with the Equifax and Capital One breaches that exposed hundreds of millions of customer records. But there are other attacks that don’t make the headlines. Over the years, the Carnegie Endowment’s FinCyber project has documented hundreds of separate cyber incidents impacting financial institutions around the world.

Guild Education Gives Salt an A+ for API Protection

Keeping our customers’ data safe so that they can move forward with business innovation is our constant north star here at Salt. But it’s even more gratifying when our mission is in service to a higher purpose, as it is with today’s announcement of our deployment at Guild Education. With its Career Opportunity Platform, Guild Education helps employees forge a better career path through education.

API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, and Prevention Methods

API2:2019 Broken User Authentication happens when an attacker bypasses an API’s authentication and authorization mechanisms and gains access to sensitive data or functionality that should only be available to authorized users.