API Security Is Finally Gaining Attention That it Deserves

Ensuring the security of API calls is crucial for protecting sensitive data, preventing unauthorized access, and maintaining the integrity of the system. Read all

Compliance Automated Standard Solution (COMPASS), Part 5: A Lack of Network Boundaries Invites a Lack of Compliance

In this article, we share our experience in authoring compliance policies that go deeper than configuration management. Read all

AWS IAM Basics: Identity and Access Management

Learn the basics of AWS Identity and Access Management (IAM) and how you can use it to secure your AWS account. Read all

Securing Your Containers—Top 3 Challenges

There are several pitfalls while securing containers and containerized ecosystems. Let's discuss the top three challenges in detail so you can manage them. Read all

IMAP OAuth 2.0 Authorization in Exchange Online

This article shows how a Java-based client application can connect to an e-mail server via IMAP protocol after obtaining an OAuth 2.0 access token. Read all

Implement DevSecOps to Secure Your CI/CD Pipeline

DevSecOps is a cultural approach to integrate security in our CI/CD pipeline. It ensures security is implemented on every stage of the SDLC and infrastructure. Read all

Creating a Risk-Aware Card Program

Read all

How Does WebAuthn Work?

WebAuthn is the FIDO Protocol that defines a passwordless means of authentication. This article gives a rundown of the process and how the user sees it. Read all

Securing Containers With Seccomp Filters

In this article we present a novel way to protect your container applications post-exploitation. This additional protection is called Seccomp-BPF. Read all

Where Does Cybersecurity Go From Here?

Chris Krebs shares his thoughts on the current and future state of cybersecurity and how it will get worse before it gets better. Read all

You Are Blind to the Risks in Your Cloud — Why Companies Need Cloud Security Monitoring

Migrating to the public cloud can be a risky endeavor because it decentralizes or expands a business’s attack surface. Read all

API Security Weekly: Issue 168

Learn about API vulnerability in Safari 15 leaking user info, vulnerabilities in AWS, and a podcast with Rinki Sethi and Alissa Knight discussing API security. Read all

Top Salesforce Deployment Challenges and Tips

In this article, we will dive into Salesforce deployment challenges, how to orchestrate Salesforce DevOps tools and more. Read all

 

 

 

 

Top