API attacks – why they’re particularly challenging for telecoms
Telecom operators have fallen foul of attacks against their APIs recently because their infrastructure means they face unique challenges.
The Latest On Tech News & Insights
Telecom operators have fallen foul of attacks against their APIs recently because their infrastructure means they face unique challenges.
New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisations
Cloud computing has transformed the way we work, communicate, and consume technology. From storing data to running applications, the cloud has become an essential part of our lives. But what does the future hold for this technology? In this article, we’ll take a realistic look at the future of the cloud and what we can expect to see in the coming years.
Whether through haste or lack of awareness, it’s your own employees who pose the biggest threat to your IT infrastructure.
That’s why it’s so important to take a proactive, ongoing approach to educating your entire workforce about cyber security threats and countermeasures.
How should you go about moving from a career in IT to one in recession-proof cybersecurity?
How should you go about moving from a career in IT to one in recession-proof cybersecurity?
APIs have become the number one attack vector so will attacks ramp up this year and how can businesses defend them?
Martin Cannard, VP of Product Strategy at Netwrix shares How to mitigate the risks of privileged access with Zero Standing Privilege.
2022 has certainly been an unexpected and tumultuous year for businesses – from increased cyber attacks to rising costs. So, how will 2023 fare up? Top Business Tech spoke to seven experts to find out what the next 12 months could have in store for the cyber world.
The process that follows a data breach – incident response – enables the business to assess and bolster defences. But it’s not always well executed. Jamal Elmellas looks at what you should consider when carrying out post-incident review.
Raghu Nandakumara, Head of Industry Solutions at Illumio, explains how threat actors are exploiting remote work to infiltrate an organisation’s IT
Gary Orenstein, Chief Customer Officer at Bitwarden, explains how small businesses can (easily) stay on top.
David Guest, Solution Architect and Technology Evangelist at Kocho,
A new contact smart card reader that can be used in any office or remote environment requiring a high level of security
A new contact smart card reader that can be used in any office or remote environment requiring a high level of security
David Stansfield, Product Marketing Manager SonicWall talks about why organisations must adopt Wi-Fi 6 now.
Rob Pocock, Technical Director, Red Helix shares with us how to overcome the barriers of decryption and data visibility.
Cyril Noel-Tagoe, Principal Security Researcher, Netacea shares how businesses can fight against bot attacks.
This Cybersecurity Awareness Month, Niall McConachie, regional director (UK & Ireland) at Yubico, addresses the overreliance on passwords and legacy forms of two-factor authentication, making the case for more effective options such as hardware-based security keys.
The latest research paper by Cequence Security details the top API threats detected during the first half of 2022. The report is based on analysis of more than 20 billion API transactions and reveals organisations are being plagued by shadow APIs, API abuse and Account Takeover (ATO) etc. It provides some real insights into the scale of these problems, their costs and repercussions.