96% of OSS attacks were avoidable
The recent surge in open source software (OSS) attacks and growth in APIs warrants reevaluating security strategies. Chief Privacy Officer at Cloudflare, Emily Hancock, suggests that the next generation of security must be privacy-led to mitigate risk from all angles.
This month we highlight three of the biggest challenges facing digital enterprises.
?? Pursuing privacy-first security
What’s new: Modern security may threaten data privacy laws and regulation.
Why it matters: Data privacy has been elevated as a matter of importance to mitigating risk — now more than ever, CISOs must collaborate with their CPOs to implement a privacy-first security program.
?? Are OSS attacks avoidable?
What's new: 96% of open-source software attacks that occurred last year were avoidable.
Why it matters: Reducing OSS risk requires a thorough understanding and regular management of software adoption, and implementing a comprehensive security framework like Zero Trust to help reduce the attack surface.
?? Three ways to stay ahead of new API threats
What’s new: API-related traffic now comprises the majority (approximately 57%) of all dynamic Internet traffic.?
Why it matters: API security has fallen behind the fast pace of API deployment — to securely leverage the power of APIs, organizations need purpose-built API management.
To see more, visit theNET
Have a topic you’d like to see us cover? Drop a note to [email protected].
Cybersecurity & Infrastructure Expert | Networking Specialist | 17 Years of Experience | Proven Customer-Focused Professional
12 个月OSS can work in both ways, (in regards to security). Indeed APIs extensive usage throughout the world is both necessary for interconnectivity of hundreds, if not thousands of possible end user interface configurations. Fortunately we can use these tools to test for weakness, security flaws and exploits within our company ourselves. Indeed, the exact same tools security intruders utilise for attempting successful vectors are readily available on the current iteration of the Internet. Unfortunately aligning with a purely defensive security setup is no longer a viable option in order to prevent unauthorised intrusions, partly due to the developing and exponential growth of possible attack vectors. In the end it comes down to the fact the ratio and ease of unauthorised access attempts vs protecting your infrastructure and data security, has drastically tilted in the way of the attacker. https://horizon.netscout.com - Macro scale and visualisation of ongoing attacks. https://threatmap.checkpoint.com - For a live, visualised map of ongoing attacks/intrusions. https://radar.cloudflare.com- Highly detailed and useful information and data on many areas of cybersecurity attacks.
NEON
12 个月Hey
github.com/77553322AHST/temir5.org
1 年developers.google.com g/dev/temir5org
Business Owner at TKT home made mosla products
1 年Thanks for sharing