article thumbnail

MY TAKE: How the lack of API security translates into ‘digital transformation’ security holes

The Last Watchdog

If you’re not familiar with how Facebook, Twitter and YouTube make it so easy for you and me to easily access cool content they’ve collected and stored behind their respective firewalls, then you might think “API” is a trendy type of beer. APIs got deployed into wide use without any meaningful authentication or use of encryption.

article thumbnail

As 2-factor authentication falls short, ‘adaptive multi-factor authentication’ goes mainstream

The Last Watchdog

The use of an additional form of authentication to protect the accessing of a sensitive digital system has come a long way over the past decade and a half. An Israeli start-up, Silverfort , is seeking to make a great leap forward in the state-of-the-art of authentication systems. This is what digital transformation is all about.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: Report details how cyber criminals leverage HTTPS TLS to hide malware

The Last Watchdog

This surge in TLS abuse has shifted the security community’s focus back to a venerable network security tool, the firewall. TLS is a component of the Public Key Infrastructure, or PKI , the system used to encrypt data, as well as to authenticate individual users and the web servers they log onto. Decryption bottleneck.

Malware 214
article thumbnail

GUEST ESSAY – A primer on ‘WAAP’ – an approach to securing APIs at the web app layer

The Last Watchdog

One could make the argument that Application Programming Interfaces — APIs – are a vital cornerstone of digital transformation. APIs interconnect the underlying components of modern digital services in a very flexible, open way. Related: How a dynamic WAF can help protect SMBs. Tool limitations.

article thumbnail

Thales and Palo Alto Networks collaborate to offer mid-markets the enterprise protection

Thales Cloud Protection & Licensing

As more companies move along the path toward digital transformation, the need for better security has never been more evident. While the majority of these advancements operate behind the scenes, protecting the organization transparently, authentication touches every member of an organization personally.

article thumbnail

Q&A: Here’s why it has become vital for companies to deter ‘machine-identity thieves’

The Last Watchdog

We’re undergoing digital transformation , ladies and gentlemen. LW: Can you frame what’s going on with identities when it comes to digital transformation? The actors on digitally transformed networks come from two realms: people and machines. Here are excerpts edited for clarity and length. Hudson: Sure.

article thumbnail

5 API Vulnerabilities That Get Exploited by Criminals

Security Affairs

They facilitate communication as well as critical business operations, and they also support important digital transformations. APIs have unique threat implications that aren’t fully solved by web application firewalls or identity and access management solutions. Broken Object Level Authentication (BOLA). The result?