Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

2023 API Security Trends for Financial Services

The financial services industry has embraced the wave of digital transformation, allowing their customers to make informed decisions and instant transactions with the click of a button. One of the unsung heroes providing that level of customization and access are a collection of microservices and application programming interfaces (APIs).

API Security Trends 2023 - Have organizations improved their security posture?

APIs, also known as application programming interfaces, serve as the backbone of modern software applications, enabling seamless communication and data exchange between different systems and platforms. They provide developers with an interface to interact with external services, allowing them to integrate various functionalities into their own applications.

Noname Security and Intel Trust Authority: Building Trust Through Confidential Computing

Intel’s Trust Authority is a new service that provides remote verification of the trustworthiness of a compute asset, based on attestation (cryptographic verification) and policy (a legitimate workload). This is a significant development for confidential computing, as it provides a way for organizations to independently verify the security of their workloads. Noname Security is excited to be a partner in the Intel Trust Authority program.

Finding API Flaws Before Production

API flaws can cause several problems that can have negative consequences in production. These issues can range from security vulnerabilities, poor performance, and functionality errors. But most importantly, API flaws can lead to data breaches, system downtime, and damage to your company’s reputation. Therefore, it’s essential to thoroughly test and monitor APIs to detect and fix any flaws before they cause significant harm.

National Cybersecurity Strategy Implementation Plan published; Carrots and Sticks

This is the third installment in the National Cybersecurity Strategy series. To read the other two blogs, click here for part 1 and here for part 2. As I was drafting the third installment on the National Cybersecurity Strategy, the National Cybersecurity Strategy Implementation Plan was published. This follow-on document provides greater specificity on detailed actions to be taken. As such, moving forward, the two should be viewed together and assessed as a pair.

How to Detect Suspicious API Traffic

Detecting suspicious API traffic is of utmost importance in today’s digital landscape. With the increasing reliance on APIs, or application programming interfaces, for data exchange between different applications and systems, it has become crucial to ensure the security and integrity of these interactions. One of the main reasons why detecting suspicious API traffic is so significant is the potential threat it poses to the overall system and its data.

Featured Post

How Financial Services Cyber Regulations are Hotting Up For API Security

Financial services firms deploy an increasingly complicated mix of technologies, systems, applications, and processes to serve customers and partners and to solve organisational challenges.Focused heavily on consumer hyper-personalisation, banks are evolving more and more digital assets and services to meet and exceed growing customer experience expectations.

Noname Security: Seeing the Whole Elephant

The parable of the blind men and an elephant is a story of a group of blind men who have never encountered an elephant before, and who learn and imagine what the elephant is like by touching it. Each blind man feels a different part of the elephant’s body, but only one part, such as the side or the tusk. They then describe the elephant based on their limited experience, and their descriptions of the elephant are different.

Featured Post

Why Fuzzing isn't enough to Test your APIs

In today's fast-paced development environment, a comprehensive API security testing strategy is no longer a luxury, but a necessity. Testing your APIs for security gaps ensures that your APIs functions are reliable, secure, and perform as expected under different circumstances. It helps to identify issues such as incorrect data formats, missing or inaccurate data, and faults in authentication or authorisation.

How to Use ITSM, SIEM, and SOAR to Remediate API Attacks

In recent years, there has been a significant rise in the number of API attacks, posing a growing threat to businesses and organizations across various industries. APIs, or application programming interfaces, have become essential for enabling communication and data exchange between different software systems. However, this increased reliance on APIs has also made them an attractive target for cybercriminals.