security

6 Essential Technologies for Successful DevSecOps 6 Essential Technologies for Successful DevSecOps

Effective DevSecOps requires the support of technologies that can continuously identify and manage security risks throughout the entire software development lifecycle (SDLC).

Gilad David Maayan's picture
Gilad David Maayan
API Security, PII, and Healthcare API Security, PII, and Healthcare

In this article, we examine the importance of API security in the healthcare sector, sharing best practices to ensure personally identifiable information (PII) of users and patients is protected.

Ali Cameron's picture
Ali Cameron
Wrangling API Security Amid Rapid Growth Wrangling API Security Amid Rapid Growth

APIs are an open attack vector for an organization's network and data. Here are some best practices to secure APIs and test them more thoroughly.

Ross Moore's picture
Ross Moore
Securing Software Deployments: Understanding Your Attack Surface

As organizations embrace new technologies to modernize their business processes, they increase their attack surface. Since it is easier to protect a small attack surface, organizations should strive to minimize it to reduce the risk of a successful cyberattack.

Gilad David Maayan's picture
Gilad David Maayan
4 DevOps Security Challenges and Solutions 4 DevOps Security Challenges and Solutions

Various cultural and technical challenges can impact DevOps security, but the main security issues generally derive from the gap between the security and development teams.

Gilad David Maayan's picture
Gilad David Maayan
4 Questions to Audit API Security 4 Questions to Audit API Security

In the first half of 2021, API attacks had increased by 348%. With the proliferation of APIs, we have every reason to plan for an increase in the number and complexity of attacks. This questioning to API security provides lines of inquiry that lead to a better understanding of how APIs fit into security and business.

Ross Moore's picture
Ross Moore
The 5 Biggest Challenges Facing the IoT Today The 5 Biggest Challenges Facing the IoT Today

The Internet of Thing's rapid growth and prevalence has brought with it a host of unique challenges that have to be addressed as we continue to integrate it into our personal and professional lives. So, let’s look at why they exist, and possible solutions to them.

Matthew Cooper's picture
Matthew Cooper
Why Are Credential Stuffing Attacks On The Rise?

Malicious hackers have an abundance of attack methods at their disposal, ranging from the crude to the highly sophisticated. Credential stuffing is a type of brute force cyber attack that is increasing in popularity, and this article seeks to explain why.

Ronan Mahony's picture
Ronan Mahony