Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Postman API Security Testing Tutorial

According to a recent study by OWASP, 70% of all web applications are vulnerable to security risks. API security testing is one of the most effective ways to mitigate these risks. Postman is a popular tool for API security testing, with over 10 million users worldwide. In today's digital world, APIs are the backbone of most applications. As a result, they are also a prime target for hackers. This is why it's important to perform security testing on your APIs to ensure that they are not vulnerable to attack.

The Future of Agentic AI

Last April, Microsoft Security Copilot taxied down the runway and took flight to help passengers onboard to reach new destinations in cyber defense. BlueVoyant, as a Microsoft Security Copilot pre-launch design advisory council member, was a trusty flight attendant that helped Security Copilot safely take off. Today, as Security Copilot has reached its cruising altitude, Microsoft announced Security Copilot agents that help its passengers to further optimize Microsoft Security tools usage.

Security Week 2025: in review

Thank you for following along with another Security Week at Cloudflare. We’re extremely proud of the work our team does to make the Internet safer and to help meet the challenge of emerging threats. As our CISO Grant Bourzikas outlined in his kickoff post this week, security teams are facing a landscape of rapidly increasing complexity introduced by vendor sprawl, an “AI Boom”, and an ever-growing surface area to protect.

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)

The concept of “principle of least privilege” has been around for a long time. In fact, it is older than me; there are papers from the 70s that discuss it: “Every program and every user of the system should operate using the least set of privileges necessary to complete the job.” (The protection of information in computer systems, Saltzer and Schroeder, 1974).

WatchOS 2025: Security Uncovered - Your Guide to Protecting Your Device in the Digital World

It is essential to secure wearable devices especially the Apple Watch in the connected world of today. With the recent release of watchOS 11 in September 2024, Apple has set a high standard for data protection and has since enhanced its platform for 2025. Such things as watchOS 11.3 which are used to fix some bugs and patch some vulnerabilities are also another proof of Apple's commitment in ensuring that the data of the users is secure despite the fact that new threats such as app cloning, man-in-the-middle attack, and data leakage exist.

Sustainable Home Lifts: Eco-Friendly Options for Australian Homes

Australia's residential landscape is evolving, propelled by increasing demands for accessibility, multi-generational living, and ageing in place. At the same time, a powerful wave of environmental consciousness is sweeping through the housing market. Homeowners are becoming more attuned to sustainability, seeking out eco-friendly solutions for home modifications. This intersection of accessibility needs and environmental responsibility has driven the development of sustainable home lifts-a rapidly growing market in Australia.

Why API Security Can't Wait: Protecting Your Business in an API-Driven World

In today’s hyper-connected digital landscape, APIs (Application Programming Interfaces) are the backbone of innovation. They power seamless integrations, drive generative AI applications, and enable businesses to scale rapidly. But with great power comes great risk. The explosive growth of APIs has created a sprawling attack surface that cybercriminals are eager to exploit.