2 min read - The new Google API allows a network service to obtain a hardware-backed cryptographic guarantee of the identities of a device and the user accessing it.
6 min read - The X-Force Exchange API has undergone two significant changes since it went public in April 2015: Anonymous access disappeared and rate limits appeared.
3 min read - Threat intelligence is a critical source of information that can enrich most security products and defensive strategies.
3 min read - OAuth is an authorization and authentication protocol using APIs to enable a third-party website or application to access a user's data.
5 min read - Learn about the security risks associated with server APIs and techniques you can use to comprehensively mitigate these API-related risks.
2 min read - Microservices offer speed and flexibility for applications, but they also expose users and developers to a larger attack surface.
10 min read - The X-Force Exchange API offers a host of capabilities that can increase threat intelligence and information sharing among users.
3 min read - NoSQL data storage systems have become popular due to their scalability and flexibility. This blog addresses some possible risks of the databases.
2 min read - Security researcher David Sopas of WebSegura claims there is a potentially massive hole in the Instagram API. Instagram has not yet made moves for a fix.
3 min read - Consistent and standard audit records enable the use of tools like QRadar that can process audit records and work at every layer of a cloud infrastructure.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.