Enable AI without compromising on cybersecurity

application network cybersecurity

Many businesses today are trying to augment and improve their customer, partner, and employee experiences by leveraging artificial intelligence and bots, yet grapple with the issue of cybersecurity. We’ve all heard of the numerous accounts of cybercriminals taking advantage of chat APIs, social network application vulnerabilities, and increasingly sophisticated phishing campaigns. However, the majority of cybersecurity hacks are still accomplished in a rather old-fashioned manner — through the use of stolen credentials.

It’s time for a new security model

blog security apis

Traditional security models—such as firewalls and DMZs—were designed to protect the perimeter. The thinking was that if the four walls of a company were protected, then threats would be neutralised before they come anywhere near core IT infrastructure. However, when bad actors inevitably made their way inside, they were often left undetected and free to move about as they extracted sensitive business data.

How Cybercriminals Take Advantage of Chat APIs and What To Do About It

cyber crime

David Berlind is editor-in-chief of ProgrammableWeb

Cybersecurity solution provider Trend Micro has issued a report that highlights how chat platform APIs can and are being used by cybercriminals to achieve their nefarious objectives. 

Because of the degree to which Webhook APIs are involved (an API attack vector not previously discussed on ProgrammableWeb), the warnings and incidents should serve as a wake-up call to API providers and developers when it comes to the sorts of best practices and ongoing vigilance it takes to fully secure their customers and systems.Provided that the incentives are worth it,