Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Embracing Zero Trust for API Security

For this inaugural episode of our Public Sector Podcast, we had the pleasure of hosting Chris Cleary, Principal Cyber Advisor for the Dept. of the Navy. Tune in as he and our very own Dean Phillips, Executive Director at Noname Security Public Sector, discuss the evolving threat landscape for government agencies, the role of Zero Trust frameworks, as well as how API security will be instrumental in their journey.

STIGs, FIPS, ZT, and API Security

The United States has been a leader in information technology for decades, and the U.S. government has been a major driver in that arena from the start. Considering the sensitivity of data shared between agencies, as well as how lucrative that data is to cybercriminals, the government realized early on that it needed strong security standards to protect itself from malicious actors.

Real-time co-editing on desktop using native Google Workspace tools

With deep integrations into Google Workspace, Egnyte enables users to streamline the document creation process by delivering a seamless experience to create, co-edit and share documents directly from within the Egnyte Desktop App and Web UI. By using Egnyte as the document source, files are also protected from internal misuse and external threats, ensuring that users can collaborate with confidence, without concerns of exposing sensitive data.

Mapping the MITRE ATT&CK Framework to API Security

APIs have emerged as the leading attack vector and attack surface most targeted by cybercriminals. That's why it's important to understand the tactics and techniques used by attackers while they're targeting APIs. In this video, we help you achieve this level of understanding by mapping the MITRE ATT&CK framework to API security attacks.

What is Certificate Management? Definitions and Benefits to Securing the IoT

In today’s digital age, online security has become a major concern for businesses of all sizes. With the increasing number of cyber-attacks and data breaches, it is crucial that organizations take measures to protect their sensitive information from falling into the wrong hands. This is where SSL/TLS certificates come in handy as they provide encryption and authentication to ensure secure communication between servers and clients.

AI, ChatGPT and Identity Security's Critical Human Element

In 1999, a far-fetched movie about a dystopia run by intelligent machines captured our imaginations (and to this day, remains my favorite film). Twenty-four years later, the line between fact and fiction has all but vanished and the blockbuster hits much differently. Are we entering the Matrix? Are we already in it? Can anyone be sure?

Is Your AI Fast Enough?

Artificial intelligence has arguably overstayed its welcome as a buzzword in the technology realm, leading to debates around the efficacy of the tool and definition of the term for the better part of two decades. But in the world of cybersecurity, businesses are just beginning to reap the benefits of advanced machine learning models that can actually keep up with ever-changing threats from cybercriminals with nothing but time on their hands to break algorithm-based defenses.

What Is IoT Device Management? Definition, Key Features and Benefits

IoT Device Management (IDM) is a software platform that helps businesses manage their IoT devices, from identifying and tracking assets to automating operations. IDM features a wide range of features to help businesses manage their IoT devices. IoT device management platforms allow you to remotely control, monitor and update your entire fleet of IoT devices at scale.

3 Ways AI Transforms Security

Security AI usage has surged, and enterprises are reaping the benefits. In its 2022 Cost of a Data Breach Report, IBM found that organizations deploying security AI and automation incurred $3.05 million less on average in breach costs – the biggest cost saver found in the study. According to the study, organizations using security AI and automation detected and contained breaches faster. However, while leveraging AI clearly makes a difference, organizations must implement the right architecture.