New York state authorities fined auto insurance giant Geico $9.75 million for failing to protect customers' driver's license numbers during a wave of cyber incidents in early 2021. Travelers will pay $1.55 million after hackers used stolen credentials to filch license numbers in mid-2021.
As API adoption expands, organizations face unique security risks. Traditional website protection measures fall short, leaving businesses vulnerable to authentication and authorization abuses, said Richard Meeus, director of security technology and strategy for EMEA at Akamai.
Google asserts that platformization and consolidation can help contain today's sophisticated threats. Embedding generative AI into security is also required as the industry moves from assisted AI to semi-autonomous and, eventually, to autonomous security, with the goal of security by default.
Following a comprehensive survey of 2,800 IT and security professionals across the globe, Prisma® Cloud's team unveiled intriguing findings in their 2024 State of Cloud-Native Security Report.
The report survey found that although 47% of organizations know about security risks associated with AI-generated code,...
In recent years, many of the world’s biggest companies have migrated to the cloud. With a large portion of them choosing Microsoft 365, it’s no surprise that it has become a prime target for cyber criminals. And while Microsoft has a host of native email security capabilities, they’re simply no match for...
Dating apps collect and sell user location data, leading to significant privacy risks. Users are vulnerable to stalking, harassment and even prosecution in certain countries, says Victor Le Pochat, postdoctoral researcher at KU Leuven. Pochat and Dhont called for improved data protection measures.
APIs are the connections that make digital business happen. Companies on average rely on more than 15,000 APIs, but these interfaces pose security risks. In this "Deep Dive" special report, ISMG's Anna Delaney explores how security leaders are tackling API security.
Akamai’s $450 million acquisition of No Name Security marks a pivotal point in API security. Oz Golan, Noname's CEO and Akamai's vice president of API security, discusses the integration plans, technological synergies, and future growth opportunities that come with Akamai’s extensive customer base.
Welcome to "Cyber Fail," where our experts uncover fails so we can all strengthen our defenses. Today, we take on the looming menace of zombie APIs, the terrors of election dysfunction and the scary legacy of government-backed spyware and its impact on privacy rights.
In this special edition of the ISMG Editors' Panel, we honored the memory of industry veteran Steve King, managing director of CyberEd.io. His friend Richard Bird joined ISMG editors to share reflections on Steve's legacy, his contributions to cybersecurity, and the importance of questioning the status quo.
Hackers behind the leak of 10 million records from Australia's second-largest telecommunications carrier Optus exploited a vulnerability the company unwittingly inserted four years earlier into a web portal access control, said the Australian Communications and Media Authority.
An independent security researcher discovered a critical flaw in the backend infrastructure of the largest broadband provider in the United States that, if exploited, could have left millions of business customer devices vulnerable to major cyberattacks.
API security is a critical concern in today's interconnected world. Rupesh Chokshi, senior vice president and general manager, application security, Akamai, shared insights into the recent acquisition of Noname Security driven by the increasing adoption of APIs in the digital economy.
Robert Blumofe, executive vice president and CTO at Akamai, expects social engineering, phishing, extortion and AI-driven attacks to dominate the threat landscape. He advised enterprises to use FIDO2-based MFA, zero trust, microsegmentation and API security to reduce risks.
In the latest weekly update, ISMG editors discussed how the surge in API usage poses challenges for organizations, why good governance is so crucial to solving API issues and how The New York Times' legal action against OpenAI and Microsoft highlights copyright concerns.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.