Secure APIs to Drive Digital Business
By Mourad Jaakou, General Manager Amplify at Axway Back in 2010, API Evangelist blogger Kin Lane posited that application programming interfaces (APIs) are driving the…
By Mourad Jaakou, General Manager Amplify at Axway Back in 2010, API Evangelist blogger Kin Lane posited that application programming interfaces (APIs) are driving the…
What is social engineering? By Jenna Greenspoon, Head of Parenting, Kidas As an avid internet user, it’s likely that at some point, you received an…
By Jim Mundy, Director of Security Operations, Segra Most business owners may be aware of cybersecurity defenses such as firewall, DDoS prevention, or various endpoint…
Why Liquidity Matters for Lending Protocols By Professor Ronghui Gu, Co-Founder, CertiK On October 18, 2022, Moola Market – a non-custodial liquidity protocol operating on…
General guidelines and realities of managing a cybersecurity program for critical national infrastructure By Juan Vargas, Cybersecurity and Engineering Consultant, Artech, LLC What’s the reality…
Analysis Shows Phishing Strikes Up 61% Over 2021, With a 50% Increase on Mobile Devices By Patrick Harr, CEO, SlashNext Hybrid offices and BYOD policies…
By Thomas Segura, Technical Content Writer, GitGuardian By large, software is still in its adolescence compared to other large-scale industries. Although its principles have been…
The State of Mobile Security in 2022” Underscores Both the Importance of Mobile Apps and the Relative Lack of Resources Being Allocated to Runtime App…
By Zac Amos, Features Editor, ReHack Keeping up with cybercriminals is a full-time job, as new attack types appear daily. Cybersecurity analysts must consider botnet…
By Raul Popa, CEO & Co-Founder, TypingDNA Like other types of insurance, Cybersecurity Insurance protects businesses in case of a rainy day. But as breaches…
By Kelly Ahuja, Versa Networks CEO As more organizations consider their own 5G MEC (Multi-Access Edge Computing) roll outs and environments, there are important deployment…
There has been a rise in cyber-attacks on banks and financial institutions from bad international actors, and it stems from organizations approaching encryption wrong. By…