Sicurezza

Threats on APIs and Mobile Applications

Pubblicato il

Web Application Programming Interfaces, or Web APIs, are essential building blocks of our digital lives. They provide the tools and protocols that enable web and mobile applications to provide dynamic content and up to date, personalized information. Our cars, bikes, and fitness trackers rely on Web APIs to track and guide us to our personal […]

Sicurezza

Automation for NetOps and DevOps

Pubblicato il

Many organizations use public cloud service providers, some in addition to their private cloud and on premise deployments. The right product mix not only reduces vendor lock-in and shadow IT, but is also an enabler for the constituents that includes IT administrators, network and security operations, as well as DevOps. Maintaining application security and configurations […]

Sicurezza

How to Move Security Up the DevOps Priority List

Pubblicato il

If you are in the information security business like me, you have probably improved your frequent flyer status recently. Indeed, May-June are when most industry events occur. Like birds, we fly when spring arrives. In this blog, I’ll share some thoughts based on conversations I had during my own journeys, including those at the global […]

Sicurezza

Bot Manager vs. WAF: Why You Actually Need Both

Pubblicato il

Over 50% of web traffic is comprised of bots, and 89% of organizations have suffered attacks against web applications. Websites and mobile apps are two of the biggest revenue drivers for businesses and help solidify a company’s reputation with tech-savvy consumers. However, these digital engagement tools are coming under increasing threats from an array of […]

Sicurezza

4 Emerging Challenges in Securing Modern Applications

Pubblicato il

Modern applications are difficult to secure. Whether they are web or mobile, custom developed or SaaS-based, applications are now scattered across different platforms and frameworks. To accelerate service development and business operations, applications rely on third-party resources that they interact with via APIs, well-orchestrated by state-of-the-art automation and synchronization tools. As a result, the attack […]

Sicurezza

How to Prevent Real-Time API Abuse

Pubblicato il

The widespread adoption of mobile and IoT devices, and increased use of cloud systems are driving a major change in modern application architecture. Application Programming Interfaces (APIs) have emerged as the bridge to facilitate communication between different application architectures. However, with the widespread deployment of APIs, automated attacks on poorly protected APIs are mounting. Personally […]

Sicurezza

Are Connected Cows a Hacker’s Dream?

Pubblicato il

Humans aren’t the only ones consumed with connected devices these days. Cows have joined our ranks. Believe it or not, farmers are increasingly relying on IoT devices to keep their cattle connected. No, not so that they can moo-nitor (see what I did there?) Instagram, but to improve efficiency and productivity. For example, in the […]

Sicurezza

Bots 101: This is Why We Can’t Have Nice Things

Pubblicato il

In our industry, the term bot applies to software applications designed to perform an automated task at a high rate of speed. Typically, I use bots at Radware to aggregate data for intelligence feeds or to automate a repetitive task. I also spend a vast majority of time researching and tracking emerging bots that were […]

Sicurezza

Will We Ever See the End of Account Theft?

Pubblicato il

There’s an 87 Gigabyte file containing 773 Million unique email addresses and passwords being sold on online forums today called “Collection #1.” We know that many users of websites are using the same passwords all over the internet; even after all the years of data breaches and account takeovers and thefts, user behavior stays the […]

Sicurezza

Adapting Application Security to the New World of Bots

Pubblicato il

In 2018, organizations reported a 10% increase in malware and bot attacks. Considering the pervasiveness (70%) of these types of attacks reported in 2017, this uptick is likely having a big impact on organizations globally. Compounding the issue is the fact that the majority of bots are actually leveraged for good intentions, not malicious ones. As a result, it is […]