Please turn on your JavaScript for this page to function normally.
lock
Dangerous misconceptions about emerging cyber threats

Organizations are leaving common attack paths exposed in their quest to combat emergent threats, according to Cymulate. The most concerning cyber threats The report delves …

office building
TAG Cyber opens headquarters in New York to support RaaS platform development

TAG Cyber announced that it is opening its new world headquarters in the Battery Park section of Manhattan at 45 Broadway. The new office will support TAG Cyber’s Research as …

Attivo Networks ThreatStrike functionality helps hide real credentials from attacker tools

Attivo Networks announced a new way of protecting credentials from theft and misuse. As part of its Endpoint Detection Net (EDN) Suite, the ThreatStrike functionality allows …

BehavioSec extends its behavioral biometrics platform into a SOC/ISO compliant SaaS version

BehavioSec announced that it has extended its patented technology and BehavioSense platform into a SOC/ISO compliant, hosted-version and a cloud-native, SaaS version. These …

Marios Damianides joins TrueFort Advisory Board

TrueFort announced that Marios Damianides, former Consulting Partner and Northeast Region Cybersecurity Leader at Ernst & Young, has joined the TrueFort Advisory Board …

ThreatQuotient launches ThreatQ TDR Orchestrator to accelerate detection and response

ThreatQuotient announced ThreatQ TDR Orchestrator, a new data-driven automation capability for more efficient and effective threat detection and response. This capability …

TAG Cyber highlights the need for Software Bill of Materials (SBOM)

The security research and advisory team at TAG Cyber has published a new article in its TAG Cyber Security Quarterly that makes the point that software bill of materials …

Hand
Understanding cyber threats to APIs

This is the fourth of a series of articles that introduces and explains API security threats, challenges, and solutions for participants in software development, operations, …

programming
Factors driving API growth in industry

This is third in a series of articles that introduces and explains application programming interfaces (API) security threats, challenges, and solutions for participants in …

Keyboard
Growth of APIs for new services

This is the second of a series of articles that introduces and explains API security threats, challenges, and solutions for participants in software development, operations, …

Terminal
Understanding the basics of API security

This is the first of a series of articles that introduces and explains application programming interfaces (API) security threats, challenges, and solutions for participants in …

Client-side web security

To address attacks such as XSS, Magecart and other card skimming exploits found in modern eCommerce environments, the use of client-side web security methods is beginning to …

Don't miss

Cybersecurity news