Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tyk Gateway API Calls To Graylog API Security

Application Programming Interfaces (APIs) are the backbone of modern software development, enabling seamless communication between various systems and services. As organizations increasingly rely on APIs to power their applications and services, the need for robust API management and monitoring solutions becomes paramount. Capturing API calls and gaining insights into their behavior can significantly enhance the development, troubleshooting, and security of APIs.

The future of cybersecurity: AI and SIEM working together

Imagine a world where your digital security isn't just a tall wall guarding against intruders but a sophisticated AI sentinel, always learning, always adapting. That's the world we're zooming into when we talk about the convergence of AI and Security Information and Event Management (SIEM) systems. This fusion is not just a fancy addition to the cybersecurity toolset; it's rapidly becoming a necessity for businesses that seek to stay ahead in this grand digital chess game against cyber threats. You should consider Exploring the Essentials of SIEM for Business Security further to help you understand better.

Securing Your Cloud Infrastructure with Azure & Tines

In the third instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your Azure environment. Firstly, we'll address the task of 'Updating groups assigned to a user in Azure Active Directory' which allows admins to update a user's group membership in Azure Active Directory. This is essential for adding extra security to accounts flagged for suspicious activity and protecting the team & company as a whole.

HIPAA Compliance in the Age of AI - A Comprehensive Guide

The healthcare landscape is undergoing a transformative journey as it intersects with the mighty realm of artificial intelligence (AI). This comprehensive guide navigates the intricate dance between compliance with the Health Insurance Portability and Accountability Act (HIPAA) and the increasing integration of AI in healthcare. In the evolving tapestry of medical practices, AI emerges as a pivotal player, influencing patient care and administrative processes.

The Complete Guide to Data Detection and Response (DDR)

In the 21st century, the lifeblood of several multi-billion dollar corporations is the data of their users they possess and how they go upon it, whether it be including new policies benefitting the users of their platform, or finding more aspects of data they can take to their advantage to increase their profit margins ever so slightly? All of the above requires data in the baseline.

Using Vanta and AWS for secrets management and encryption

This blog is part of a series about how to use Vanta and AWS to simplify your organization’s cloud security. To learn more about how to use Vanta and AWS, watch our Coffee and Compliance on-demand webinar. ‍ Amazon Web Services, or AWS, is one of the most popular cloud providers for organizations today — providing one of the most flexible and secure cloud environments available.

Always Ahead: Arctic Wolf on Artificial Intelligence

In this episode of Always Ahead, our Chief Product Officer Dan Schiappa explains how Arctic Wolf is incorporating the efficiency and speed of artificial intelligence into our security journey, empowering our world-class security concierge team to deliver comprehensive protection at the speed of data.

Snyk & Atlassian: How to embed security in AI-assisted software development

Adding AI to your software development life cycle (SDLC) comes with great opportunities — and great dangers. Is the risk worth the reward? This was the topic of conversation when Sascha Wiswedel, Senior Solutions Engineer at Atlassian, and Simon Maple, Principal Developer Advocate at Snyk, teamed up to discuss security in the (AI-assisted) software development lifecycle.