Last month, Wallarm Cybersecurity Strategist Kavya Pearlman interviewed cyberwar fare expert Chris Kubecka via a webinar session that was well attended and very timely discussion. If you missed the webinar, worry not! Here is a quick recap of the discussion around “Application Security in the age of Cyberwar”. These days we must be prepared to fight off not just hackers in search of simple financial gain, but malicious actors funded by hostile states. Asymmetry is…
In addition to the same risks that web applications are exposed to, APIs are faced with a number of unique security risks and vulnerabilities. This blogs provides an overview of the new OWASP API Top 10 risk project.
The real cost of a security breach to your business is larger than many imagine. On the surface there is incredible expensive to recovering from breaches. What is often also at risk is the inestimable damage to company morale, brand reputation, and operations.
There’s a new metric on Wallarm’s Dashboard — the cost of resources invested by hackers to attack your site. How do we measure it, and why does it matter? What metrics are used to analyze attacks? Information security is a process that subtracts funds from a business. Still, the cost effectiveness of this process is very difficult to measure. It’s impossible to estimate possible damage from an incident before it happens — and since information security doesn’t generate profit, ROI…