Please turn on your JavaScript for this page to function normally.
GraphQL
The top security threats to GraphQL APIs and how to address them

Enterprises looking to modernize their APIs are increasingly switching from the REST architecture to the open-source data query and manipulation language GraphQL. While the …

Royal Hansen
Google Protected Computing: Ensuring privacy and safety of data regardless of location

In this Help Net Security interview, Royal Hansen, VP of Engineering for Privacy, Safety, and Security at Google, talks about Protected Computing, the impact of data …

ChatGPT
ChatGPT is bringing advancements and challenges for cybersecurity

Understanding why ChatGPT is garnering so much attention takes a bit of background. Up until recently, AI models have been quite “dumb”: they could only respond to specific …

gap
Four steps SMBs can take to close SaaS security gaps

Despite economic volatility and tighter budgets, adoption of software as a service (SaaS) continues to increase. Gartner forecasts a 16.8% growth for SaaS in 2023 as companies …

Bhagwat Swaroop
Navigating the ever-changing landscape of digital security solutions

Recently, Entrust named Bhagwat Swaroop as President, Digital Security Solutions. In this role, Bhagwat will lead the evolution, growth, and expansion of the Entrust Digital …

cloud
Application and cloud security is a shared responsibility

Cloud environments and application connectivity have become a critical part of many organizations’ digital transformation initiatives. In fact, nearly 40% of North American …

vectors
Attack surface management (ASM) is not limited to the surface

Another year of high-profile cyberattacks, another year of beating the cybersecurity drums. Clearly, we’re missing a few notes. Attack surface management (ASM) is a make or …

Jeff Reich
Combining identity and security strategies to mitigate risks

Last week, the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral resources to help organizations reduce the risk of a breach by combining …

Cynomi vCiso
The risks and benefits of starting a vCISO practice

There is a definite trend of MSPs shifting into security. There are a number of very good reasons for this, including the fact that other services traditionally offered are …

CISA
Steps CISA should take in 2023

Recently, I was asked to imagine that I had been granted an hour with top officials at the Cybersecurity and Infrastructure Security Agency (CISA) – what advice would I …

Joseph Cooper
Get hired in cybersecurity: Expert tips for job seekers

The dire shortage of information security experts has left organizations struggling to keep up with the growing demand for their skills. Still, getting a job in cybersecurity …

SaaS
Reimagining zero trust for modern SaaS

The concept of zero trust – as a way to improve the security of and access to an organization’s network, systems, and data – has gained traction in recent …

Don't miss

Cybersecurity news