Remove Cyber Risk Remove Digital transformation Remove IoT Remove Penetration Testing
article thumbnail

GUEST ESSAY – A primer on ‘WAAP’ – an approach to securing APIs at the web app layer

The Last Watchdog

One could make the argument that Application Programming Interfaces — APIs – are a vital cornerstone of digital transformation. APIs interconnect the underlying components of modern digital services in a very flexible, open way. Related: How a dynamic WAF can help protect SMBs. API complexity.

article thumbnail

NEW TECH: Brinqa takes a ‘graph database’ approach to vulnerability management, app security

The Last Watchdog

Imposing just the right touch of policies and procedures towards mitigating cyber risks is a core challenge facing any company caught up in digital transformation. Related: Data breaches fuel fledgling cyber insurance market. Digital transformation is all about high-velocity innovation and on-the-fly change.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Podcast Episode 122: will 5G increase Internet of Things Risk?

The Security Ledger

And, just as important, what are the security implications of massively distributed IoT endpoints connected to capacious 5G cellular infrastructure? And, just as important, what are the security implications of massively distributed IoT endpoints connected to capacious 5G cellular infrastructure? Read the whole entry. »

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. XM Cyber is a Tel Aviv-based cyber risk analytics and cloud security vendor launched in 2016.