Nov 11, 2025 – Jeremy Snyder – A common analogy for APIs is that they are LEGO blocks, or more specifically, APIs are the little studs and slots that allow you to attach LEGO pieces to each other and build…
Tag: Security Boulevard
FireTail CEO, Jeremy Snyder, Set to Present at UK Cyber Week 2023 – FireTail Blog
Nov 11, 2025 – Jeremy Snyder – On April 5, 2023, during UK Cyber Week, our CEO Jeremy Snyder will present, “API security – what is it, why you should care, and how to protect your org”. The session, part…
FireTail Names Timo Rüppell as Vice President of Product – FireTail Blog
Nov 11, 2025 – Jeremy Snyder – McLean, Va. – Jan. 24, 2023 – FireTail Inc., a disruptor in API security, today announced the appointment of Timo Rüppell to the executive leadership team as Vice President of Product. In conjunction…
CYFIRMA & FireTail: Working Together for Complete Visibility and Robust API Security – FireTail Blog
Nov 11, 2025 – Alan Fagan – CYFIRMA is an external threat landscape management platform that combines cyber intelligence with attack surface discovery and digital risk protection to deliver early warning, personalized, contextual, outside-in, and multi-layered insights. The company’s cloud-based…
API Security: Bridging the Gap Between Application and Security Teams – FireTail Blog
Nov 11, 2025 – Jeremy Snyder – API Security: Why the Gap Developers and security professionals have different concerns and motivations. It’s easy to see why gaps emerge. The ability to quickly ship new products, features or functionality is a…
Application Attack Patterns: Attack Graphs Reveal 81 Threats Your Tools Miss
TL;DR Applications face thousands of attack attempts monthly, yet traditional security tools miss the ones that matter most. New data from Contrast Security reveals that while WAFs, EDR, and SIEM platforms excel at their designed functions, they cannot see inside…
IDOR Attacks and the Growing Threat to Your API Security – FireTail Blog
Nov 11, 2025 – Jeremy Snyder – IDOR Attacks: Common And Deadly IDOR attacks, or Insecure Direct Object Reference (IDOR) attacks, are one of the most common and costly forms of API breach. In an IDOR attack, hackers directly reference…
Cybersecurity Maturity and Why Your API Security is Lagging Behind – FireTail Blog
Nov 11, 2025 – Jeremy Snyder – Understanding Cybersecurity Maturity Models (CMM) Cybersecurity maturity models offer valuable guidance for organizations seeking to enhance their security posture. While the Cybersecurity Maturity Model Certification (CMMC) version 1.0, originally created by the U.S.…
Data Privacy in the World of ChatGPT: Risks, Importance, Best Practices
What is ChatGPT? ChatGPT is a conversational AI that has been created by OpenAI and is based on the ability to understand and generate text that is in many ways similar to how a human being would write it, given…
United States of America Veterans Day November 11, 2025: Honoring All Who Served
Veterans Day Poster Competition – via The United States Department of Veteran’s Affairs: Veterans Day Poster Competition – Each year the Veterans Day National Committee publishes a commemorative Veterans Day poster. The Committee selects a poster from artwork submitted by…
Encryption, Encoding and Hashing Explained
What is Encoding? Encoding is a process of transforming the data into different parameters to enhance its compatibility, usefulness, and to transmit it through various systems and applications. Therefore, the main purpose of encoding is not security for data but…
Cloud Security Automation: Using AI to Strengthen Defenses and Response
AI-driven automation is transforming cloud security by detecting anomalies in real time, and enabling intelligent threat response. The post Cloud Security Automation: Using AI to Strengthen Defenses and Response appeared first on Security Boulevard. This article has been indexed from Security Boulevard…
Evaluating the Attack Surface of AI Chatbots Deployed in Enterprise Settings
AI chatbots boost enterprise efficiency but expand the attack surface. Learn about vulnerabilities like prompt injection, data leakage, and API exploits — and how to secure them. The post Evaluating the Attack Surface of AI Chatbots Deployed in Enterprise Settings …
AI Agents Rewriting Fraud Rules
The New Fraud Frontier: How AI Agents Are Rewriting the Rules Pop quiz: What percentage of your traffic is from agentic AI? If you answered “I don’t know,” you are not alone – and you’re sitting on a major blind…
Faster Than Real-Time: Why Your Security Fails and What to Do Next
“Security systems fail. When it fails, what do you do?” This critical question from Spire Connect’s Pankaj Sharma set the stage at Gitex 2025 for a conversation with Francois Driessen, the “Human Ambassador” of ADAMnetworks. His core message is blunt:…
How Safe Are Your NHIs in Hybrid Cloud Environments?
Are Your NHIs in Hybrid Cloud Environments Truly Secure? Is your organization leveraging the benefits of a hybrid cloud environment while ensuring the security of its Non-Human Identities? NHIs, or machine identities, are increasingly pivotal where organizations shift more operations…
Can Your NHIs Withstand a Cyber Attack?
Are You Optimizing Your NHIs for Cyber Attack Resilience? When faced with the myriad challenges of cybersecurity, have you considered how to optimize your Non-Human Identities (NHIs) for better protection against cyber threats? NHIs, representing machine identities, are increasingly targeted…
Why Trust in NHIs Is Essential for Business Security
What Are Non-Human Identities (NHIs) in Cybersecurity? Have you ever considered the importance of trust within your organization’s cybersecurity framework? Trust is not just applicable to human interactions but also extends to non-human entities, specifically to Non-Human Identities (NHIs). NHIs…
Empower Your Security Team with Efficient NHI Management
How Can NHI Management Revolutionize Your Security Practices? How can organizations bridge the gap between their security and R&D teams to create a more secure cloud environment? The answer lies in the effective management of Non-Human Identities (NHIs) and Secrets…
HYPR and Yubico Deepen Partnership to Secure and Scale Passkey Deployment Through Automated Identity Verification
For years, HYPR and Yubico have stood shoulder to shoulder in the mission to eliminate passwords and improve identity security. Yubico’s early and sustained push for FIDO-certified hardware authenticators and HYPR’s leadership as part of the FIDO Alliance mission to…