Security News > 2020 > October > Week in review: Hardware security, protecting APIs, determining the true impact of a cyber attack
Three immediate steps to take to protect your APIs from security risksUndermining the power of an API-driven development methodology are shadow, deprecated and non-conforming APIs that, when exposed to the public, introduce the risk of data loss, compromise or automated fraud.
Nowadays, companies not only invest in IT security solutions, but also in the training of their employees with the goal of making them more conscious of security issues.
Measuring impact beyond a single incidentDetermining the true impact of a cyber attack has always and will likely be one of the most challenging aspects of this technological age.
Hardware security: Emerging attacks and protection mechanismsMaggie Jauregui's introduction to hardware security is a fun story: she figured out how to spark, smoke, and permanently disable GFCI wirelessly with a walkie talkie.
MITRE Shield shows why deception is security's next big thingMITRE recently added to their portfolio and released MITRE Shield, an active defense knowledge base that captures and organizes security techniques in a way that is complementary to the mitigations featured in MITRE ATT&CK. Cybersecurity lessons learned from data breaches and brand trust mattersYour brand is a valuable asset, but it's also a great attack vector.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/H14YWgOeXTg/
Related news
- Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar (source)
- T-Mobile US 'monitoring' China's 'industry-wide attack' amid fresh security breach fears (source)
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)
- Update your OpenWrt router! Security issue made supply chain attack possible (source)
- CERT-UA Warns of Phishing Attacks Targeting Ukraine’s Defense and Security Force (source)
- API security blind spots put businesses at risk (source)