Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Introducing Recon to Stay Ahead of Attackers

API security can feel impossible to master. That's because you need to know how many APIs you have, the types of data they touch, how to keep them safe from attacks, and how to test them for misconfigurations and vulnerabilities. All while keeping an accelerated pace for development and deployment. However, even when all those bases are checked, you can still be vulnerable to cyber attacks. How exactly?

Noname Security builds scalable and cost effective API security solution

Noname API security optimized for greater performance and lower business costs with 3rd Gen Intel® Xeon® Scalable processors Today, I’m thrilled to announce that Noname Security has collaborated with Intel to build the most scalable and cost-effective API security solution. Through its work with Intel, Noname has optimized its AI/ML operations by over 30% on the 3rd Generation Intel® Xeon® Scalable processor.

Announcing Release 3.4

We’re excited to announce the release of 3.4, the latest set of additions and enhancements to the Noname API Security Platform. Noname’s research & development team – the largest of its kind dedicated to API security – is constantly improving the Noname Platform with new releases made available to customers every few weeks.

End-to-End API Security

Doing security properly for application programming interfaces (APIs) is a process that goes well beyond security. It’s also about IT operational and architectural issues that drive security outcomes. To be successful, API security must be viewed as an end-to-end process covering the full software lifecycle. It starts with development but continues through runtime and end-of-life.

Optus Data Breach - Why Vulnerable APIs are to Blame

For those that haven't heard, Optus, the second largest telecom company in Australia, exposed over 11.2 million customer records including names, physical and email addresses, birth dates and, for some, government issued id numbers such as drivers license or passport numbers. Yoikes.Optus hasn't provided many specific details so far but there's plenty to consider.

Stolen Future: How Data Theft Dilutes Our Growth Trajectory

During my 34-year career in federal law enforcement, I repeatedly saw the damage data theft caused to unsuspecting victims. Whether the result was an elderly retiree losing their life savings, a company losing its intellectual property, or the military losing technology that took years to research and billions of dollars to fund.