APIs: The Trojan horses of security

At the moment, within the cybersecurity industry the emphasis tends to be on securing networks with perimeter-based protection, however, leaving an application endpoint unsecured means an application programming interface (API) can serve as a gateway to the data centre by which attackers can effectively attack the backend via bots, and compromised or impersonating applications. With…

Get serious about consumer data protection

The idea that organizations should be doing more to protect the personal data they hold about individuals has been gaining ground in recent years. The European Union’s General Data Protection Regulation (GDPR) sparked a scramble to operationalize data management and security. If you thought that it was a one-off, then the incoming California Consumer Privacy…

10 Threats Lurking on the Dark Web

Security pros can never rest. Even with the operation last year that took down AlphaBay and Hansa, industry experts say many groups continue to trade in malware, ransomware, and stolen credentials on the Dark Web, and that the criminals who were caught simply reorganized. “People need to understand that there’s an underground economy – a…

How blockchain is impacting information security in companies

Hype surrounding any subject can be either positive, or negative; and at this point in the tech sphere nothing exemplifies this idea more than blockchain. On a positive note, the hype surrounding the decentralized technology is for the most part positive and exciting, being as the tech is considered revolutionary and applicable to virtually all…

How pervasive is the insider threat in your company?

The pervasiveness of the insider threat is something every company worries about. And according to the conclusions reached by Dtex Systems based on threat assessments from several global organizations, 100 percent of companies have blind spots that enable the continued presence of the insider threat. No argument there. Every company that provides their employees with…