96% of OSS attacks were avoidable

96% of OSS attacks were avoidable

The recent surge in open source software (OSS) attacks and growth in APIs warrants reevaluating security strategies. Chief Privacy Officer at Cloudflare, Emily Hancock, suggests that the next generation of security must be privacy-led to mitigate risk from all angles.

This month we highlight three of the biggest challenges facing digital enterprises.


?? Pursuing privacy-first security

What’s new: Modern security may threaten data privacy laws and regulation.

Why it matters: Data privacy has been elevated as a matter of importance to mitigating risk — now more than ever, CISOs must collaborate with their CPOs to implement a privacy-first security program.

Article (6 min read)


?? Are OSS attacks avoidable?

What's new: 96% of open-source software attacks that occurred last year were avoidable.

Why it matters: Reducing OSS risk requires a thorough understanding and regular management of software adoption, and implementing a comprehensive security framework like Zero Trust to help reduce the attack surface.

Article (6 min read)


?? Three ways to stay ahead of new API threats

What’s new: API-related traffic now comprises the majority (approximately 57%) of all dynamic Internet traffic.?

Why it matters: API security has fallen behind the fast pace of API deployment — to securely leverage the power of APIs, organizations need purpose-built API management.

Article (7 min read)


To see more, visit theNET

Have a topic you’d like to see us cover? Drop a note to [email protected].

Rav Singh

Cybersecurity & Infrastructure Expert | Networking Specialist | 17 Years of Experience | Proven Customer-Focused Professional

12 个月

OSS can work in both ways, (in regards to security). Indeed APIs extensive usage throughout the world is both necessary for interconnectivity of hundreds, if not thousands of possible end user interface configurations. Fortunately we can use these tools to test for weakness, security flaws and exploits within our company ourselves. Indeed, the exact same tools security intruders utilise for attempting successful vectors are readily available on the current iteration of the Internet. Unfortunately aligning with a purely defensive security setup is no longer a viable option in order to prevent unauthorised intrusions, partly due to the developing and exponential growth of possible attack vectors. In the end it comes down to the fact the ratio and ease of unauthorised access attempts vs protecting your infrastructure and data security, has drastically tilted in the way of the attacker. https://horizon.netscout.com - Macro scale and visualisation of ongoing attacks. https://threatmap.checkpoint.com - For a live, visualised map of ongoing attacks/intrusions. https://radar.cloudflare.com- Highly detailed and useful information and data on many areas of cybersecurity attacks.

回复

Hey

  • 该图片无替代文字
回复
Süleyman Temir

github.com/77553322AHST/temir5.org

1 年

developers.google.com g/dev/temir5org

回复
Zakaria Khan

Business Owner at TKT home made mosla products

1 年

Thanks for sharing

要查看或添加评论,请登录

Cloudflare的更多文章

社区洞察

其他会员也浏览了