Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Announcing: Code-free API log collection and parser creation

AT&T Cybersecurity is pleased to announce a code-free way for our USM Anywhere customers to make their own API-driven log collectors and custom parsers. This big advancement in threat detection and response technology will make it possible for customers to collect information from a much larger variety of sources and SaaS services without having to request new integrations or log parsers.

Establishing a mobile device vulnerability management program

The introduction of mobile devices has rapidly changed the world as we know it, as these small gadgets that are intended to fit into the palm of our hands rapidly gained dominance over our day-to-day activities. Thanks to these portable devices, we now have access to an abundance of information available to us on demand with minimal effort.

How open source C++ code can introduce security risks

Open source libraries and frameworks are a great way to jump-start development projects. Open source empowers developers to do some great things without reinventing the wheel and developing solutions for problems that have already been solved. However, adding any code to a project carries an inherent risk of introducing potential vulnerabilities that may have made their way into it through error or malice.

Rubrik and GraphQL - Episode 4 - Powershell

Powershell is by far the most widely utilized SDK that Rubrik provides. While an SDK is currently under development to cover off everything Rubrik Security Cloud and GraphQL, this episode will show you how to make raw GraphQL API calls into the Rubrik platform using the infamous scripting tool. You will see how to form various queries and mutations within Powershell, and how to parse the returned responses - performing real-world automation scenarios with Powershell and Rubrik.

MasterCard allows Digital ID Verification of patients on Mobile Phones.

Seamless and smooth is the new mantra that every company is trying to achieve in their operation and client’s dealings. Healthcare services are adapting fast to this mantra, and the master card is the new revolution keeping the industry in sync with high user experience through the implementation of ID verification. It’s the digital age; almost everything in this world now operates with the help of AI and its different realms.

Proven Ways to Slash Mobile App Security Costs

Mobile app security testing is expensive, and that’s a fact. For instance, a single quality penetration test costs around $20,000-$30,000. But do you essentially have to pay this high for the service? Mobile app development companies are cutting costs because of the economic meltdown or investors pulling out. And this could make it hard to set aside tens of thousands of dollars just for penetration testing, right? Moreover, without the right budget, how would you manage app security? Solution?

Rubrik and GraphQL - Episode 2 - GraphQL Queries

At the core of GraphQL lies the query. Queries allow us to fetch exactly the data we need from the Rubrik platform. This episode will dive into how we form basic queries to retrieve Rubrik objects for usage with automation. We’ll talk about how to form a query, create fragments, and pass data into our queries using variables.

3 examples of organizations that could have benefited from a CASB

In recent times, the widespread use of cloud services has become common for most organizations. While many organizations now enjoy the savings and convenience afforded by hosting their data and services on cloud platforms, this shift towards the cloud brings with an increased vulnerability to data theft and cyberattacks.