feature6 notable API security initiatives launched in 2023API security is climbing the agenda for organizations and the wider cybersecurity community. Here are six initiatives rolled out in 2023 that tackle API security issues.By Michael HillSep 19, 20237 minsApplication SecurityCloud SecuritySecurity Practices news analysis AWS cryptojacking campaign abuses less-used services to hideBy Lucian ConstantinSep 18, 20236 minsMalwareCloud SecurityCybercrimebrandpostSponsored by Fortinet Critical cloud-delivered security services for SASEBy Satish MadirajuSep 14, 20237 minsCloud Security newsCisco Secure Application brings app and security teams togetherBy Samira Sarraf Sep 12, 20233 minsDevSecOpsApplication SecurityCloud Security newsOrca’s new LLM tool to help detect Log4j-like exploitsBy Shweta Sharma Sep 08, 20233 minsConfiguration ManagementCloud Security newsIAM, cloud security to drive new cybersecurity spendingBy Michael Hill Sep 07, 20234 minsCSO and CISOGenerative AICloud Security brandpostSponsored by FortinetThe key to securing your cloud perimeterBy Vince Hwang Aug 30, 20235 minsCloud Security newsGoogle Workspace to gain AI-enabled security, digital sovereignty controlsBy Michael Nadeau Aug 23, 20236 minsEmail SecurityGenerative AIApplication Security featureHow API authentication vulnerabilities are at the center of cloud security concernsBy Susan Bradley Aug 23, 20236 minsAuthenticationCloud SecurityAPIs ArticlesbrandpostSponsored by NTTWhy automation capabilities are a critical part of a security leader’s success.Automation in cybersecurity brings a multitude of benefits that empower security leaders to tackle modern challenges head-on.By Brenden Bosch, Principal Specialist, Sales Enablement at NTT Jul 20, 2023 4 minsCloud SecuritySecuritynews analysisAttackers can abuse Google Cloud Build to poison production environmentsPermissions for predefined Google Cloud Build user roles can be abused for privilege escalation.By Lucian Constantin Jul 18, 2023 7 minsCloud SecurityVulnerabilitiesnewsEnterprises aren’t betting big on API controls yet, says studyAkamai’s latest study finds organizations are not prepared for API-based attacks as most report scant controls.By Shweta Sharma Jul 18, 2023 3 minsAPIsCloud SecuritynewsCloud security startup Orca sues rival Wiz for patent infringementIsraeli cybersecurity startup Orca has accused Wiz of taking its “revolutionary inventions” and creating a “copycat cloud security” platform.By Michael Hill Jul 14, 2023 3 minsCloud SecurityLegalbrandpostSponsored by Microsoft SecurityIt’s time for identity governance to go mainstreamAs identities change, so too do the ways we protect and manage them. Discover why smart businesses are empowering project managers and business users to control access as needed.By Microsoft Security Jul 12, 2023 4 minsCloud SecurityopinionSponsored by CiscoCisco launches new network, security, and observability solutions and previews generative AI capabilities for Webex and Security CloudCisco’s innovative technologies help connect the dots of its network- and cloud-based ecosystem. By Pete Bartolik Jun 28, 2023 4 minsCloud SecuritybrandpostSponsored by Microsoft SecurityEnhancing cloud infrastructure security via infrastructure as code As cloud computing only continues to grow in popularity, forward-thinking companies are taking this specific approach to equip and defend the next generation of cloud-enabled workers. By Microsoft Security Jun 28, 2023 5 minsCloud SecuritynewsFortanix adds confidential data search for encrypted enterprise dataFortanix Confidential Data Search supports scalable searches in encrypted databases with sensitive data, without compromising data security or privacy regulations.By Shweta Sharma Jun 27, 2023 3 minsDatabase AdministratorEncryptionCloud Securitynews analysisFileless attacks surge as cybercriminals evade cloud security defensesThreat actors are concealing campaigns to evade detection and establish stronger footholds in compromised systems.By Michael Hill Jun 27, 2023 5 minsCyberattacksSupply ChainApplication SecuritybrandpostSponsored by Microsoft SecurityModernize your cybersecurity environment with XDR and SIEMAs cloud computing grows more widespread and people, applications, data, and identities become more dispersed, security teams need a better way to increase visibility and track threats across the enterprise. That's where XDR and SIEM come in.By Microsoft Security Jun 23, 2023 5 minsCloud SecuritybrandpostSponsored by FortinetTaking a centralized approach to cloud securityWhile using the cloud has many advantages for businesses, it also brings new difficulties that security teams of all sizes must be aware of and address.By Vince Hwang, senior director of products and solutions, Fortinet Jun 22, 2023 4 minsCloud SecurityfeatureHybrid Microsoft network/cloud legacy settings may impact your future security postureSwitching from legacy Active Directory systems to the cloud can improve versatility but hybrid systems need special attention to ensure they’re still secure.By Susan Bradley Jun 22, 2023 7 minsActive DirectoryWindows SecurityCloud Security Show more Show less View all Upcoming Events11/Oct virtual summit AI Leadership Summit: Data-driven Leadership & GenAIOct 11, 2023Virtual Employee ProtectionCloud SecurityData and Information Security View all events Resources whitepaper Comprehensive Protection for Campus Data Amid the threat of ransomware and other cyberattacks, colleges and universities need solutions that can help them securely protect their data, detect any anomalies, and respond and recover quickly in the event of a network compromise. The post Comprehensive Protection for Campus Data appeared first on Whitepaper Repository. By Cohesity 18 Sep 2023Business OperationsCloud SecurityData Management whitepaper CJ Moses' Security Predictions for 2023 and Beyond By AWS 14 Sep 2023Cloud ComputingCloud SecuritySecurity whitepaper Video Security as a Service Streamlines Deployments By Intel 12 Sep 2023Application Performance ManagementCloud ManagementCloud Security View all Video on demand videoHoneypots and the evolution of botnets | Salted Hash Ep 23Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. Apr 20, 2018 12 minsAdvanced Persistent ThreatsFirewallsBackup and Recovery DJI's bounty problems and video surveillance programs | Salted Hash Ep 13 Jan 08, 2018 21 minsData BreachHackingApplication Security Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 Dec 18, 2017 26 minsCloud SecurityCloud ComputingSecurity The latest on Azure Stack, cyberattacks, the next iPhone and ... keyboards Jul 20, 2017 41 minsAppleMicrosoftSmartphones See all videos Explore a topic Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis DHS unveils one common platform for reporting cyber incidents By Cynthia Brumfield Sep 25, 202310 mins RegulationRegulationRegulation news Chinese state actors behind espionage attacks on Southeast Asian government By Shweta Sharma Sep 25, 20234 mins Advanced Persistent ThreatsCyberattacks feature How to pick the best endpoint detection and response solution By Linda Rosencrance Sep 25, 202310 mins Intrusion Detection SoftwareSecurity Monitoring SoftwareData and Information Security podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video What is zero trust security? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO