Hand

Three firmware blind spots impacting security

Built into virtually every hardware device, firmware is lower-level software that is programmed to ensure that hardware functions properly. As software security has been …

Terminal

Understanding the basics of API security

This is the first of a series of articles that introduces and explains application programming interfaces (API) security threats, challenges, and solutions for participants in …

Client-side web security

To address attacks such as XSS, Magecart and other card skimming exploits found in modern eCommerce environments, the use of client-side web security methods is beginning to …

bot

Let’s be realistic about our expectations of AI

Pop culture contains no shortage of intelligent robots. When the tool became viable and widely available in real life, people brought a number of enthusiastic but unrealistic …

BYOK

Multi-cloud key management and BYOK

Cloud providers such as Google Cloud Platform, AWS, and Microsoft Azure work hard to be the service provider of choice for enterprise customers. They often push the envelope …

code

Understanding web security solutions

As should be evident to anyone in the cyber security industry, the wide range of available web security solutions from commercial vendors will necessarily have varying degrees …