Insights

API Security: Bridging the Gap Between Application and Security Teams – FireTail Blog

Nov 11, 2025 – Jeremy Snyder – API Security: Why the Gap Developers and security professionals have different concerns and motivations. It’s easy to...

CYFIRMA & FireTail: Working Together for Complete Visibility and Robust API Security – FireTail Blog

Nov 11, 2025 – Alan Fagan – CYFIRMA is an external threat landscape management platform that combines cyber intelligence with attack surface discovery and...

FireTail Names Timo Rüppell as Vice President of Product – FireTail Blog

Nov 11, 2025 – Jeremy Snyder – McLean, Va. – Jan. 24, 2023 – FireTail Inc., a disruptor in API security, today announced the...

FireTail CEO, Jeremy Snyder, Set to Present at UK Cyber Week 2023 – FireTail Blog

Nov 11, 2025 – Jeremy Snyder – On April 5, 2023, during UK Cyber Week, our CEO Jeremy Snyder will present, “API security –...

Introduction to REST API Security – FireTail Blog

Nov 11, 2025 – Jeremy Snyder – A common analogy for APIs is that they are LEGO blocks, or more specifically, APIs are the...

Cloud Security Automation: Using AI to Strengthen Defenses and Response 

Cloud security has become a ticking time bomb. With thousands of alerts inundating security operations centers every day and new threats coming online every minute, human...

Trending News

In memoriam: David Harley

Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security 07 Nov 2025  • ...

The who, where, and how of APT attacks in Q2 2025–Q3 2025

ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report 07 Nov 2025...

ESET APT Activity Report Q2 2025–Q3 2025

ESET ResearchThreat Reports An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025 Jean-Ian...

Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming

How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data Christian Ali Bravo 05 Nov 2025  •  ,...

How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)

Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you – and what you can...

Ground zero: 5 things to do after discovering a cyberattack

Business Security When every minute counts, preparation and precision can mean the difference between disruption and disaster Phil Muncaster 03 Nov 2025  •  , 5...