article thumbnail

API Security for the Modern Enterprise

IT Security Guru

Per a recent report from Q4 2020 to Q4 2021 , the average number of APIs per company increased by 221% in 12 months and that API attack traffic grew by 681% while overall API traffic grew by 321%. Microservices Architecture has Created a Security Blind Spot. Microservices communicate over APIs. API Security Tools.

DDOS 114
article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Thursday, November 5, 2020. Director, Industry Solutions Americas Solutions Architecture & Customer Success. Elizabeth has been with AWS for 5-1/2 years and leads Industry Solutions within the Americas Solutions Architecture and Customer Success organization. Live Panel. 10am PT | 12pm CT | 1pm ET. Register Now.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Real-Life SaaS Attack Misconfiguration Exploits Can Teach Us

IT Security Guru

It’s reported that Citrix was one such target in an ironic twist as they specialize in federated architectures, yet the FBI suggested that the attackers gained a foothold with password spraying and then bypassed additional layers of security. Lesson 3: Implement a security protocol to onboard new apps and limit user permissions in all apps.

CISO 102
article thumbnail

How to Improve SD-WAN Security

eSecurity Planet

SD-WAN is a virtual architecture for managing a wide-area network covering distributed, hybrid IT environments typical for today’s enterprise organizations. This cloud-centric model offers administrators granular network management opportunities while leveraging the bandwidth and reducing the cost of service delivery.

article thumbnail

Russian-speaking cybercrime evolution: What changed from 2016 to 2021

SecureList

On top of that, due to changes in legislation that limited financial institutions in hiring external services, the number of cases we investigated for financial industry clients in 2020 was zero. We investigated 200 cases for clients in Russia in 2020, and already over 300 in the first nine months of 2021.

article thumbnail

IT threat evolution Q2 2021

SecureList

Black Kingdom first appeared in 2019; in 2020 the group was observed exploiting vulnerabilities (such as CVE-2019-11510) in its attacks. In 2019, Gootkit stopped operating after it experienced a data leak , but has been active again since November 2020. Black Kingdom ransomware. Notify your supervisors as soon as possible.

article thumbnail

A guide to OWASP’s secure coding

CyberSecurity Insiders

Furthermore, whether developing software for portable gadgets, desktop systems, or servers, secure coding is critical for modern software development. According to the Software Engineering Institute, software architecture or coding flaws are responsible for up to 90% of security problems. Input validation. File management.