Security News > 2020 > October > Week in review: Hardware security, protecting APIs, determining the true impact of a cyber attack
Three immediate steps to take to protect your APIs from security risksUndermining the power of an API-driven development methodology are shadow, deprecated and non-conforming APIs that, when exposed to the public, introduce the risk of data loss, compromise or automated fraud.
Nowadays, companies not only invest in IT security solutions, but also in the training of their employees with the goal of making them more conscious of security issues.
Measuring impact beyond a single incidentDetermining the true impact of a cyber attack has always and will likely be one of the most challenging aspects of this technological age.
Hardware security: Emerging attacks and protection mechanismsMaggie Jauregui's introduction to hardware security is a fun story: she figured out how to spark, smoke, and permanently disable GFCI wirelessly with a walkie talkie.
MITRE Shield shows why deception is security's next big thingMITRE recently added to their portfolio and released MITRE Shield, an active defense knowledge base that captures and organizes security techniques in a way that is complementary to the mitigations featured in MITRE ATT&CK. Cybersecurity lessons learned from data breaches and brand trust mattersYour brand is a valuable asset, but it's also a great attack vector.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/H14YWgOeXTg/
Related news
- New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet (source)
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks (source)
- Vulnerable APIs and Bot Attacks Costing Businesses Up to $186 Billion Annually (source)
- The dark side of API security (source)
- EDRSilencer red team tool used in attacks to bypass security (source)
- ISC2 Security Congress 2024: The Landscape of Nation-State Cyber Attacks (source)
- Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks (source)
- Product showcase: Shift API security left with StackHawk (source)
- Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar (source)