article thumbnail

If You’re Only Doing WAF, You’re Doing API Security Wrong

ForAllSecure

Some organizations have begun using Web Application Firewalls (WAFs) to protect their APIs, but this isn’t a true solution to API security. In May 2021, Peloton, the exercise company, found that its API was not authenticating users properly. What do APIs do? Unfortunately, that’s already happened.

article thumbnail

Effectively Manage All Endpoints, No Matter Where They Are Located

CIO Business Intelligence

The 2021 PwC Remote Work Survey found that 83% of employers believe remote work has been successful, and 55% of managers said employees only need to work in the office three days a week or less to retain a strong culture. CIOs and CSOs still have to ensure that employees outside of the corporate firewall can do their work securely.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 136

Scott Lowe

Welcome to Technology Short Take #136, the first Short Take of 2021! This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Networking.

Linux 60
article thumbnail

How to Protect New Remote Workers Against Cybercrime

SecureWorld News

In 2021, remote working is still very much considered the norm as the world continues to combat the coronavirus pandemic. Within an office environment, workers have a number of protections, such as the company firewall and regularly updated infrastructure. Without these protections, remote staff can potentially be vulnerable.

How To 52
article thumbnail

North Korean Threat Actors Targeting Healthcare Sector with Maui Ransomware

SecureWorld News

The FBI says that since May 2021, North Korea threat actors have used Maui to encrypt servers responsible for healthcare services, such as electronic health records services, diagnostics services, imaging services, and intranet services. Maui is believed to be designed for manual execution by attackers.

article thumbnail

Technology Short Take 117

Scott Lowe

The key takeaway here is that anytime there is firewalling or other stateful services in place, the traffic will route to the (non-distributed) service router instead of just the distributed routers. spec , expected in to land in 2021. Northbound Networks provides some information on the P4 programming language. Servers/Hardware.

Storage 60
article thumbnail

Ingenious Phishing Tactics in the Modern Scammer's Toolbox

SecureWorld News

Morse code cloaking dubious materials In a clever move first spotted in February 2021, malicious actors used meaningful combinations of dots and dashes (known as Morse code) to obfuscate harmful URLs in a file attached to an email. To view it, the unsuspecting person has to go through a rabbit hole of authentication steps.

Google 94