Articles : Security

5 MINUTES

How Does Threat Intelligence Work?

by Iwan Price-Evans on Security • January 5, 2022

The software and web industries speak a lot about security and the ability to handle security threats intelligently. In a landscape where security is becoming increasingly complex in nature, it's important that those running websites, applications, and APIs in production have visibility of the threats their organizations are facing and how best to mitigate those threats. Threat intelligence can help achieve this, but how does it work and how should security teams integrate a threat intelligence solution into their toolchain?

Read More →
3 MINUTES

Using Machine Learning For Better Threat Intelligence

by Iwan Price-Evans on Security • December 16, 2021

Organizations are operating digital infrastructure at a scale never seen before. This scale is producing enormous volumes of threat data from multiple sources, which requires processing across millions of lines of input on a daily basis. Many businesses and security teams are looking to machine learning (ML) to try to make sense of all the data. In particular, if ML technology can help them to identify threats and respond to them faster and more accurately than a team of human experts doing the work manually, it would provide a significant upgrade to cybersecurity.  In this article, we look at the different ways that a machine learning engine, such as the one built into Snapt’s NovaSense threat intelligence platform, can help security teams to make critical decisions.

Read More →
3 MINUTES

Threat Intelligence vs Log4j

by Dave Blakey on Security • December 14, 2021

As many of you will already know, the Log4j vulnerability has been making waves in the industry. We put out a post last week on how we mitigate the attack (read more on CVE-2021-44228) but something we haven't spoken about is how effective our threat intelligence platform has been at preventing the attack, and the insights from a platform like NovaSense.

Read More →
8 MINUTES

Understanding Threat Intelligence Use Cases

by Dave Blakey on Security • November 24, 2021

We've spoken recently about threat intelligence and the role it plays in protecting organizations, platform infrastructure, data, and transactions from various cyber threats. However, it is important to understand the particular use cases, so you can apply threat intelligence to solve specific security challenges in your organization. 

Read More →
6 MINUTES

Hosted Edge vs Cloud: the battle for latency and security

by Iwan Price-Evans on Cloud • October 14, 2021

We talk a lot about the importance of cloud computing and moving infrastructure into the cloud for better performance and availability on a global scale. However, with expectations for application performance continuing to rise and people connecting in more remote places than ever, some businesses need to do more than simply maintain a cloud presence – they need to consider the benefit of setting up a hosted edge environment. A hosted edge can provide a massive reduction in latency, translating to a huge improvement to user experience, more conversions, more revenue, and better customer retention. However, the edge is often harder to secure than a core network, and more variable than the big public clouds. Can businesses enjoy the latency advantage of the edge with application security they can trust?

Read More →
4 MINUTES

Eliminate The Human Factor In Application Security

by Dave Blakey on Security • September 16, 2021

When it comes to online security, businesses make a lot of effort to ensure they have the right tools, firewalls, and settings in place to protect their applications from the dangerous threat of hackers, viruses, and DDoS attacks. However, the biggest security risk that is often not explored enough is the human factor.

Read More →
6 MINUTES

Best Practices for Edge Security

by Craig Risi on Security • September 7, 2021

In the corporate tech fight against security threats, there is perhaps no struggle more difficult than dealing with Edge Security. While companies can put in extensive security protocols and systems to protect much of their data, applications, and core data centers or cloud servers, monitoring the security of an entire organization and the people working for it is incredibly difficult.  

Read More →
7 MINUTES

Best Practices for Application Data Protection and Fraud Prevention

by Mark Trent on Tips and Tricks • August 17, 2021

It should perhaps go without saying that software security is the number one threat facing many companies in this technological age. With data now the most important asset that companies own and need to protect, security is one area that you can ill afford to compromise on. For this reason, you must develop strategies for securing data specifically, over and above protecting the rest of your IT systems and code.

Read More →

Subscribe via Email

Get daily blog updates straight to your email inbox.

We care about the protection of your data. Read our Privacy Policy.

You have successfully been subscribed!