Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Noname Security

noname security

Understanding the NIS2 Directive: What it Means for Your Business and How to Secure Your APIs

In recent years, cybersecurity threats have become increasingly common and sophisticated, posing significant risks to individuals, businesses, and governments. In response to these threats, the European Union (EU) has introduced the NIS2 Directive, a new legislation focused on improving cybersecurity across the EU.

noname security

Financial Services Firms: Address FFIEC's Stringent API Security Regulations with Noname Security

Financial services companies are a favorite target for threat actors. Most of us are familiar with the Equifax and Capital One breaches that exposed hundreds of millions of customer records. But there are other attacks that don’t make the headlines. Over the years, the Carnegie Endowment’s FinCyber project has documented hundreds of separate cyber incidents impacting financial institutions around the world.

noname security

A Former FBI Agent's Thoughts: National Cybersecurity Strategy

The government just released its new National Cybersecurity Strategy built around five pillars: I have many thoughts and inputs on each of these pillars and will address them in individual installments to keep them easily digestible. I believe vigorous debate on these issues is important so we can achieve the best possible outcomes in each of these lines of effort. Implementing strategy is when the hard work begins and the stakes couldn’t be higher with this topic. We have to get it right.

noname security

Preparing for the Soon to be Updated OWASP API Security Top 10

The Open Web Application Security Project (OWASP) is a global non-profit organization dedicated to improving the security of software. The OWASP foundation first released a list of the top 10 security risks faced by APIs in 2019. Although 4 years is an extremely long time when it comes to computing, the fact remains that most organizations are still in the process of putting better API security controls in place to protect against the 2019 Top 10.

Inventory All Your APIs and Classify Sensitive Data

Noname Security Posture Management helps you maintain an accurate inventory of all your APIs, including legacy and shadow APIs. We can scale to hundreds or thousands of pieces of infrastructure, monitoring load balancers, APIs gateways, and web application firewalls to help you locate and catalog every type of API, including HTTP, RESTful, GraphQL, SOAP, XML-RPC, JSON-RPC, and gRPC.

What is an API Gateway?

In a nutshell, the API gateway accepts API calls and aggregates the requests to the various required services. It serves as a bridge between internally used web unfriendly protocols and web protocols that users understand. Though API gateways provide basic API security controls, they unfortunately are not enough to adequately protect your business from API specific threats.