Category: EN

The ABCs of API Security: A New (Free!) Learning Center

APIs have been with us since before they were called APIs. Application programming interfaces as an interface between software or between users and software have been around since the 1940’s, around 20 years before such interfaces were called APIs. In…

Check Point Software Technologies Expands SecureAcademy™ Program in Canada with Eight New Universities and Colleges to Empower the Next-Generation of Cybersecurity Professionals

The cybersecurity education program provides programming to academic institutions across the country, including Sheridan College, Willis College, and, most recently, the University of Calgary. Canadian organizations across all sectors are being targeted by cyberattacks. As the incidence of cybercrime continues…

MOVEit Hack: What went wrong, and how to course correct

What the MOVEit Breach Tells Us About the Challenges of Patching On May 31, 2023, little-known software developer Progress Software published details of a critical vulnerability in MOVEit Transfer, a popular managed file transfer service. It soon transpired that notorious…

CSA Launches First Zero Trust Certification

The CCZT program incorporates foundational principles from leading sources such as CISA and NIST This article has been indexed from www.infosecurity-magazine.com Read the original article: CSA Launches First Zero Trust Certification

Check Point Software Technologies Expands SecureAcademy™ Program in Canada with Eight New Universities and Colleges to Empower the Next-Generation of Cybersecurity Professionals

The cybersecurity education program provides programming to academic institutions across the country, including Sheridan College, Willis College, and, most recently, the University of Calgary. Canadian organizations across all sectors are being targeted by cyberattacks. As the incidence of cybercrime continues…

Top 5 Risks of Artificial Intelligence

Artificial intelligence (AI) technology functions in a manner that helps ease human life. Through AI-enabled systems, different industries have been able to minimize human error and automate repetitive processes and tasks while smoothly handling big data. Unlike humans, who are…

Bad Bots Account for 73% of Internet Traffic: Analysis

The top five categories of Bad Bot attacks are fake account creation, account takeovers, scraping, account management, and in-product abuse. The post Bad Bots Account for 73% of Internet Traffic: Analysis appeared first on SecurityWeek. This article has been indexed…

Zimbra Zero-Day Exploited to Hack Government Emails

Google says a Zimbra zero-day from earlier this year, CVE-2023-37580, was exploited in several campaigns to hack government emails. The post Zimbra Zero-Day Exploited to Hack Government Emails appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

Biden Campaign Looking for CISO

The Biden for President campaign is looking for a cybersecurity chief to “define the organization’s risk appetite” and manage its cybersecurity and IT initiatives. The post Biden Campaign Looking for CISO appeared first on SecurityWeek. This article has been indexed…