Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

STIGs, FIPS, ZT, and API Security

The United States has been a leader in information technology for decades, and the U.S. government has been a major driver in that arena from the start. Considering the sensitivity of data shared between agencies, as well as how lucrative that data is to cybercriminals, the government realized early on that it needed strong security standards to protect itself from malicious actors.

How to Reduce API Sprawl with API Discovery

API sprawl is a term used to describe the uncontrolled proliferation of APIs across an organization. It’s a common problem for organizations that have multiple development teams and a wide variety of applications and services. As more APIs are created, it becomes increasingly difficult to keep track of them and how they’re being used. And by the looks of it, things are about to get a lot more complicated.

Noname Security Launches API Security Platform to Help Organizations Increase Cyber Resilience

Enterprises face a challenging environment: economic headwinds, efficiency, and cybersecurity resilience dominate board meeting discussions amid rapid changes in technology. APIs especially have gone from playing a minor role in digital operations to being a company’s most important, mission-critical connections. In today's digital age, APIs have become an essential component of many organizations' business strategies.

Understanding the NIS2 Directive: What it Means for Your Business and How to Secure Your APIs

In recent years, cybersecurity threats have become increasingly common and sophisticated, posing significant risks to individuals, businesses, and governments. In response to these threats, the European Union (EU) has introduced the NIS2 Directive, a new legislation focused on improving cybersecurity across the EU.

A Former FBI Agent's Thoughts: National Cybersecurity Strategy

The government just released its new National Cybersecurity Strategy built around five pillars: I have many thoughts and inputs on each of these pillars and will address them in individual installments to keep them easily digestible. I believe vigorous debate on these issues is important so we can achieve the best possible outcomes in each of these lines of effort. Implementing strategy is when the hard work begins and the stakes couldn’t be higher with this topic. We have to get it right.

Financial Services Firms: Address FFIEC's Stringent API Security Regulations with Noname Security

Financial services companies are a favorite target for threat actors. Most of us are familiar with the Equifax and Capital One breaches that exposed hundreds of millions of customer records. But there are other attacks that don’t make the headlines. Over the years, the Carnegie Endowment’s FinCyber project has documented hundreds of separate cyber incidents impacting financial institutions around the world.

Preparing for the Soon to be Updated OWASP API Security Top 10

The Open Web Application Security Project (OWASP) is a global non-profit organization dedicated to improving the security of software. The OWASP foundation first released a list of the top 10 security risks faced by APIs in 2019. Although 4 years is an extremely long time when it comes to computing, the fact remains that most organizations are still in the process of putting better API security controls in place to protect against the 2019 Top 10.

5 Key Compliance Regulations Every Business Should Be Aware Of

Data privacy laws and compliance regulations are critical safeguards for protecting consumer and employee data from unnecessary exposure. By complying with these legal requirements, businesses can reduce the risk of legal action and financial penalties, ensure data privacy, increase customer loyalty, as well as avoid reputational damage. Most importantly, they’re able to protect their customers and employees from the misfortunes arising from identity theft.