
Steve Winterfeld
Articles
-
Dec 3, 2024 |
securityboulevard.com | Steve Winterfeld
As leaders responsible for cybersecurity programs, we are asked to create plans with annual budgets for the next year even though the technical infrastructure, threats and business models are bound to change. This requires us to design agility into our programs in ways we have not had to, previously. The speed of change has hit the point where we need to reconsider some of our standard assumptions and practices.
-
Jul 16, 2024 |
securityboulevard.com | Steve Winterfeld
As we move into new business strategies or transition to new enterprise deployment models CISOs must constantly look to update the risk register and security program controls. The function that most companies have moved to recently is application programming interface (API). The benefits of publishing a set of definitions or protocols to interface with has incredible business benefits but at the same time makes it easy for cybercriminals to automate attacks.
-
Jun 25, 2024 |
akamai.com | Danielle Walter |Steve Winterfeld
On June 24, we closed our acquisition of Noname Security, and we are excited to share our plans for advancing the protection of APIs. On June 24, we closed our acquisition of Noname Security, and we are excited to share our plans for advancing the protection of APIs. Noname Security is one of the top API security vendors in the market, and this acquisition will accelerate our ability to meet growing customer demand and market requirements.
-
May 29, 2024 |
akamai.com | Christine Ross |Steve Winterfeld |Carley D. Thornell
One of the more pernicious attack vectors in today’s threat landscape is DNS flood attacks, which attempt to exhaust the resources of nameservers, global server load balancers (GSLBs), or firewalls by sending an overwhelming number of illegitimate DNS queries. A common flood technique is an NXDOMAIN attack, in which malicious actors trigger excessive requests for nonexistent hostnames (e.g., www.doesnotexist.example.com).
-
May 28, 2024 |
securityboulevard.com | Steve Winterfeld
Security experts have many fun arguments about our field. For example, while I believe War Games is the best hacker movie, opinions vary based on age and generation. Other never-ending debates include what the best hack is, the best operating system (though this is more of a religious debate), or the best tech certification. You can find several such challenges online or in your own community. However, I recently got into a discussion about useful examples to use in cybersecurity training.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →