The Latest in IT Security

1

Google Chrome, Adobe Acrobat Reader, TeamViewer, you name it—there’s no shortage of third-party apps that IT teams need to constantly check for vulnerabilities. But to get a better picture of the problem, let’s bust out some napkin math. The average company uses about 200 applications overall. Assuming at least 75% of these have a vulnerability […]

Read more ...

1

Data Theorem has introduced the API Attack Path Visualization capabilities for the protection of APIs and the software supply chain. This latest enhancement of its API Secure solution empowers organizations with a comprehensive understanding of the attack chain, traversing all layers of an application, and extending protection to crucial underlying cloud assets including containers, storage, […]

Read more ...

1

You thought it was deprecated, but it’s still out there, and it’s not secure. It’s a zombie API. Zombie APIs are becoming more and more common, just because of the sheer number APIs and third-party vendors that organizations rely on these days. Zombie APIs slip through the cracks of DevSecOps and DevOps, or different lines […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments