What is API Protection?
When it comes to conducting business online, it is no secret that applications run the show. Today, it has never been easier to have your favorite meal delivered to your door, order a new pair of shoes, or even build […]
When it comes to conducting business online, it is no secret that applications run the show. Today, it has never been easier to have your favorite meal delivered to your door, order a new pair of shoes, or even build […]
Executive Summary The sophistication of threat actors’ DDoS strategy and tactics continues to evolve rapidly in response to improved mitigation-side efforts. Actors have complicated filtering and firewalling by bringing a more diverse set of vectors to the attack, attacking at […]
The only consistent thing about the threat landscape is its inconsistency. Security teams have their work cut out for them and it’s not getting any easier. The news reports about the ongoing slew of cyberattacks are enough to keep anyone […]
The airwaves are full of discussion around the state of the U.S. manufacturing industry, which is diverse and hugely impactful on the economy. Let’s explore that a bit more. According to the National Institutes of Science and Technology, the manufacturing […]
Retailers have long lived by the mantra: the customer is always right. It’s a great sentiment that benefits consumers who need assistance and value great customer service. But, many retailers are finding that it has left them vulnerable to bad […]
If you’ve read about security trends lately you might have run across the buzzword “zero trust”. I have to admit, it took me a while to understand this term fully – and that’s because there are a variety of definitions […]
Phishing is one of the more notorious forms of attack out there today and has been responsible for some of the most well-known security breaches. Phishing is when an intended victim is contacted by email, phone or text message by […]
Executive Summary The prevalence of malware written in Go programming language has increased dramatically in recent years due to its flexibility, low antivirus detection rates and difficulty to reverse-engineer. Black Lotus Labs, the threat intelligence arm of Lumen Technologies, recently […]
As you are reading through cybersecurity content, you might have noticed a word that pops up a lot: “botnet.” A botnet is a collection of internet-connected devices that have been infected by malware and are now under the control of […]
One of the most critical cybersecurity risks facing organizations in 2022 may not be what you think. Typically, the first thing that comes to mind is the increasing number of cyberattacks that organizations are facing. Bad actors have taken advantage […]