Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

White Paper

What's Hiding in Your External Attack Surface?

Cybersecurity teams need to develop and maintain a set of practices around their online attack surface. These practices must include attack surface visibility and mapping of third-party connections as well as constant assessment of the risks of these connections. Controls must include the ability to detect and alert on risky or broken connections, coupled with automated remediation when feasible.

Shift Left API Security Testing

With the number of APIs skyrocketing, companies are facing increasing challenges when it comes to security. Oftentimes, either there aren't enough security personnel who know how to test APIs, the number of APIs are growing faster than the security team can keep up with, or the existing security tools lack adequate coverage. Any one of these three scenarios can spell disaster for your environment. However, there is one overlooked aspect that could also weaken your API security posture if not addressed - and that's testing APIs early in the development process.

Assessing the Value of Network Segmentation from a Business Application Perspective

The concept of micro-segmentation as an approach to cloud-native security has gained traction among security experts but being able to deliver it operationally is still seen as work in progress by network and SecOps teams. This research looks at the current state of micro-segmentation and sheds light on the merits of an application-centric approach to its use in enterprise environments. Its main topics delve into the core issues that dominate the cybersecurity conversation today.

Executive View by KuppingerCole

Application Programming Interfaces (APIs) are among the foundations of modern digital business, powering the logistics of delivering digital products to partners and customers. However, Security experts have warned about numerous security risks of APIs for years. But until quite recently, many organizations still believed that their API-related risks can be sufficiently addressed by existing security tools like web application firewalls (WAFs).

6 Takeaways From the 2021 Ransomware Impact Report

2021 is set to be the Year of Ransomware. As attacks rapidly spike in frequency, increasingly eye-popping ransom demands are grabbing headlines. Consumers, once relatively shielded from any impact, are experiencing product shortages and difficulty accessing services as the organizations they do business with are knocked offline.