Blog

Table of Contents

13 data breach predictions for 2019

  …”Data breaches are inevitable at any organization. But what form will those breaches take? How will the attackers gain access? What will they steal or damage? What motivates them to attempt the attacks? CSO has gathered predictions from industry

Read More »

API Security Critical to Federal IT Modernization Strategy

  …As Federal agencies seek to incorporate an application programming interface (API) strategy into their IT modernization initiatives, a word of caution: make sure you have API-specific security integrated into your IT infrastructure.   “Modern applications often involve rich client

Read More »

Public Cloud API Security Risks: Fact or Fiction?

  …Most cloud services use multi-tenant API gateways (meaning shared across different customers and applications) to identify and verify users, as well as to act as the single point of entry across many disparate APIs. There is an obvious problem

Read More »

Public cloud API security: How safe is our data?

  …APIs let applications (and devices) seamlessly connect and communicate. An API can create a seamless flow of data between apps and devices in real time. ProgrammableWeb, a site that tracks more than 15,500 APIs, lists Google Maps, Twitter, YouTube,

Read More »