Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Securing your Cloud Infrastructure with AWS

In the first instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your AWS environment. Our first story monitors AWS IAM access keys and automatically deactivates any that are older than 30 days. Our second story looks at automatically stopping and starting EC2 instances that may have been spun up for testing purposes.

Transforming Uncertainty into Certainty: Introducing Rubrik AI-Powered Cyber Recovery

Today, cyberattacks pose the most significant threat to an organization’s data. The Spring 2023 Rubrik Zero Labs report, based on research from over 1,600 IT and Security professionals, revealed that 99% of IT and security leaders were informed of at least one attack in their own environment in 2022.

AI Automation Can Help, But Not Replace

Discover the symbiotic relationship between AI and human roles in business. While automation has its place, it doesn't supplant human presence. AI augments tasks, and you won't be replaced by AI but rather by someone empowered by it. Even small businesses face challenges affording AI integration. A real-world example from a solicitor's office sheds light on the reality for small to medium-sized businesses. Join the conversation about the delicate balance between technology and human touch in the modern business landscape.

2023 OWASP Top-10 Series: API4:2023 Unrestricted Resource Consumption

Welcome to the 5th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners. This post will focus on API4:2023 Unrestricted Resource Consumption. In this series we are taking an in-depth look at each category – the details, the impact and what you can do about it.

What is Graph QL?

GraphQL is a query language for APIs that has become increasingly popular among developers working on large-scale web applications. Created by Facebook engineers in 2015, it’s positioned as a more robust alternative to RESTful APIs. When compared to REST APIs, GraphQL has a few key differences. With RESTful APIs, you have to define how you're going to make requests to each individual endpoint. You have a list of resources and verbs (methods) available to select from in order to retrieve or manipulate data from the server, and all transactions include all fields.

Horizontal vs Vertical Scaling: Which One is Better for APIs?

As the developer community is well aware, demand for application programming interfaces, or APIs, is not static. It usually ebbs and flows over time. For instance, during the holiday season, there could be a significant spike in traffic, requiring more API capacity to handle the increased load. To meet such an increase in traffic, system admins have two choices when it comes to scaling an API. They can go with horizontal scaling, which refers to adding more API instances to a cluster. Or vertical scaling, which means adding to the computing capacity of the machine that supports the API.

Impact of the New SEC Cyber Incident Reporting Rules on the C-Suite and Beyond

We recently hosted a compact and very engaging panel discussion about the new SEC Cyber Incident Reporting Rules due to come into effect later this year. We were fortunate to be joined by two well-known experts: In the post, we will *not* rehash what was said in the panel discussion. If you did not get to attend the live session, we invite you watch it on-demand – it’s 30 minutes well spent!

5-Step Guide on Securing Serverless Architectures in the Cloud with RASP

Serverless architecture has increased in recent years, and is anticipated to grow by nearly 25% over the next decade, According to one source, the serverless architecture market was worth over $9 billion in 2022, with its compound annual growth rate projected to increase. The market could be worth over $90 billion by 2032. This indicates the immense amount of potential that this industry carries, influenced by the increasing adoption of DevOps by organizations.

Penetration Testing in AWS: Can You Test Your Cloud Security?

AWS Security provides organisations with the tools and resources they need to protect their applications, services and data in the cloud. It can help businesses identify areas of vulnerability, detect malicious activity, monitor traffic patterns for suspicious activity and prevent unauthorised access. It includes features like encryption, authentication, risk assessment and compliance monitoring.

Uncover API Vulnerabilities with Posture Management

API posture management ensures that you put your best foot forward when it comes to API security. It combines API discovery with sensitive data identification and vulnerability detection, so your remediation efforts focus on the most critical APIs first. The ability to identify API vulnerabilities and remediate them quickly allows you to take corrective action before an attack occurs.