Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Understanding Denial of Service Attacks: Prevention and Response Strategies

Denial of service attacks pose a significant threat to online services, with the power to disrupt and disable critical operations. This guide uncovers the numerous tactics attackers use, the motivations behind their malicious activities, and provides actionable strategies to fortify your network against these insidious threats.

5 Best Practices to Secure Azure Resources

Cloud computing has become the backbone for modern businesses due to its scalability, flexibility and cost-efficiency. As organizations choose cloud service providers to power their technological transformations, they must also properly secure their cloud environments to protect sensitive data, maintain privacy and comply with stringent regulatory requirements.

Bipartisan AI Task Force and More - This Month in AI

In a significant move to address the complexities of regulating artificial intelligence (AI), Speaker Mike Johnson (R-La.) and Minority Leader Hakeem Jeffries (D-N.Y.) declared the formation of a bipartisan task force dedicated to exploring AI innovation and devising safeguards against potential threats. This initiative comes as lawmakers grapple with the rapid evolution of AI technology and its implications for various sectors.

Nightfall was built on AI. Here's how we're advancing our mission to scale data protection in the enterprise.

Back in 2018, Rohan and I founded Nightfall on the belief that AI could make data leak prevention (DLP) better, faster, and more accessible to every enterprise. At the time, Rohan was a founding engineer at Uber Eats, and I was an investor at Venrock specializing in SaaS and security. From these respective vantage points, we could see that legacy solutions weren’t working, and could never keep up with the evolving threat landscape.

Top 5 Data Breaches That Cost Millions

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.” - Tim Cook, CEO of Apple Inc. The entire digital landscape has evolved into a behemoth of sorts as the number of online attacks targeting individuals, businesses, and governments has risen steadily.

AI - Boon or Bane for Appsec

Are you ready to dive into the world of application security and artificial intelligence? Watch the exclusive talk by the renowned Julian Totzek Hallhuber, Solutions Architecture Manager at Veracode, during Mind the Sec 2023 in Brazil. In this engaging talk, Julian explores the advantages and disadvantages of using AI in the AppSec landscape and discovers how AI is revolutionizing the way we protect our applications from constantly evolving cyber threats.

GoTestWAF - Quick start with Docker and PDF report

GoTestWAF is a tool for API and OWASP attack simulation that supports a wide range of API protocols including REST, GraphQL, gRPC, WebSockets, SOAP, XMLRPC, and others. It was designed to evaluate web application security solutions, such as API security proxies, Web Application Firewalls, IPS, API gateways, and others.
Featured Post

Utilities and Energy a Prime Target For API Security Incidents

As a critical element of national infrastructures worldwide, the energy and utilities sector literally keeps the lights on in today's world. When water, gas, or electricity is cut off from businesses and families, it can have catastrophic consequences. To improve resilience and guarantee service uptime, energy and utilities companies know that digitisation is key to transforming the services they deliver, but aging technology stacks, a lack of interoperability and collaboration, and poor security hygiene are all limiting progress.

Keeper 101 - How to Share a Keeper Record on iOS

Keeper’s iOS mobile app makes it easy to securely share records with friends and family. To share a record with another Keeper user, select the record from your vault and tap Share, then Share with User. Enter the user's email address or select it from the dropdown, then use the toggle buttons to choose what permissions the user will receive such as: “Can Edit”, “Can Share” and "Make Owner". If you do not enable any permissions, the user will have “view only” access.