online security
3 ways attackers bypass Multi-Factor Authentication
SE Labs Team | | 2fa, Authentication, Breach, Cybersecurity, enterprise, Hacking, MFA, Network Security, online security, passwords, security, social engineering, Targeted attacks, Threat Intelligence, tips
And 3 ways to stop them. Multi-Factor Authentication (MFA) is much more popular than it used to be. It’s easy to use and the enhanced security that it provides is supported by ...
The Layers of API Security
Guest Author | | api, API security, Blog, Cybersecurity, Data Security, Data Security Risks, Infrastructure, Network Security, online security
There’s no arguing that the API ecosystem has become a key enabler for businesses. Leveraging APIs has helped companies become more agile, grow faster, and unlock more revenue. However, companies must also ...
A security use case for ChatGPT: Email Scam Robo Judge
I have been noodling around with ChatGPT recently and have found a nice little use case that I hope someone with more coding skills and ...
Leaking company secrets via generative AIs like ChatGPT
For a third party, knowing what people from company X are asking of ChatGPT (or any other generative AI) could be quite interesting and profitable ...
Live events are back – and fraud has crashed the party
NuData Security | | 2022 events industry, Blog, Buying event tickets online and cybersecurity, Event ticketing industry, Event ticketing traffic, Event ticketing trends, online security, Post-pandemic events industry, user experience
How the event ticketing industry can respond to fraud without disrupting user experience. The post Live events are back – and fraud has crashed the party appeared first on NuData Security, A ...
Sourcepass Acquires CCSI, A Leading Enterprise IT Services Provider
Guest Author | | acquistion, Cybersecurity, Data Security, Infrastructure, online security, Sourcepass, Sourcepasss
CCSI motivated by Sourcepass’ innovative service delivery model that leverages advanced AI and RPA workflows Sourcepass announced its acquisition of Contemporary Computer Services, Inc. (CCSI), the sixth such acquisition of 2022. CCSI, ...
5 Reasons Why Email Security Is Becoming a Top Priority for Organizations
Guest Author | | Cybersecurity, Data Security, email security, Infrastructure, online security, Phishing, Privacy, Ransomware
Considering the proliferation of online threats in the modern era, email security remains a top concern for businesses. According to Verizon’s 2022 Data Breach Investigations Report, email is still one of the ...
10 Ways To Keep Your Business Safe On Black Friday and Cyber Monday
Black Friday and Cyber Monday mean big deals, but they also mean big risks. Take control of your security and privacy with these tips to keep your business safe for cyber attacks ...
APIs and the Software Supply Chain: What you need to know
Guest Author | | api, API security, Cybersecurity, Data Security, Infrastructure, online security, Privacy, software, Software Testing, supply chain
The software supply chain is a concept that refers to the processes and technologies used to manage software products over their lifespan. It's a network of entities involved in the development, distribution, ...
Vulnerability management – we’re doing it wrong
Security professionals (and the people who measure our performance like auditors and regulators) have traditionally taken a stance that “all serious vulnerabilities should be patched” ...