article thumbnail

Best Practices Q&A: The importance of articulating how cybersecurity can be a business enabler

The Last Watchdog

These key capabilities fall under the four competencies of oversight, process risk management, technology risk management, and human risk management. We operate in a world today where your business is the risk and how you adapt is the opportunity. There is also a benefit of stronger business partnerships.

article thumbnail

The Evolution of API: From Commerce to Cloud

Security Affairs

APIs then played an important role in the birth of the Internet, offering a way for applications to exchange data across the Internet via a specific set of protocols. And while this development has been crucial to getting us to where we are today, there are some risks that come with the API economy.

B2B 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. How can companies minimize risks? Regular training and simulations can help reduce risks associated with human errors.

article thumbnail

The Four Keys to Achieving an Optimal Application Experience

CyberSecurity Insiders

The fact is that every second of lag time on an online banking app risks alienating the consumer. Every glitch on an e-commerce app risks sending the consumer to a competitor. In the last few years, fueled partly by the pandemic, internet traffic has exploded, growing at an annual rate of 30% between 2018 and 2022.

Marketing 135
article thumbnail

Help Your Security Team Sleep Better at Night by Reducing False Positives

CyberSecurity Insiders

As we deploy more and more Web applications, we run the risk of overwhelming our security teams if we don’t give them the tools they need. You are likely using Web APIs to support both B2B communication and the mobile applications that users increasingly rely on in lieu of a traditional web browser.

B2B 140
article thumbnail

The Expanding Attack Surface: Don’t Forget to Protect your APIs

CyberSecurity Insiders

This presents an attack surface to the public internet that looks very different from what organizations had been used to years ago. That client doesn’t even have to be a web browser anymore—it could also be a mobile application or even B2B communication with no intention that the information is ever displayed to a human user.

B2B 115
article thumbnail

Q&A: SolarWinds, Mimecast hacks portend intensified third-party, supply-chain compromises

The Last Watchdog

SolarWinds and Mimecast are long-established, well-respected B2B suppliers of essential business software embedded far-and-wide in company networks. Dornbush: The big takeaway is that third-party risk is real and not likely to be measurable via a standard form or checklist. Your people make all the difference.

Hacking 195