
Announcing New ThreatX API Protection Capabilities
We’re pleased to announce that we have expanded and enhanced our API protection capabilities to...
VIEW MOREUnderstanding and Preventing Account Takeover
In the previous installment of our blog series on the modern threat landscape, we looked...
VIEW MOREAPI Gateway Security – What kind of security do API gateways offer?
APIs are critical building blocks of modern applications and also represent one of the...
VIEW MORECredential Stuffing Examples and Keys to Detection
As part of our ongoing blog series on the modern threat landscape, we are taking a look at some of...
VIEW MOREDetecting and Blocking Log4j2: ThreatX Retro
Security pros are having a week. “No rest for the weary” would be an...
VIEW MORELog4j2 Vulnerability Mitigation at ThreatX
On December 9, 2021, a vulnerability was reported in Log4j2, an open source tool widely used by...
VIEW MOREGrinch Bots Wreaking Havoc This Holiday Season
We’re right in the midst of the biggest online shopping days of the year. Add...
VIEW MOREHow ThreatX Lowers False Positives, Delivers Visibility, and Speeds Time to Value
We talk to a lot of security professionals about web application security, and three...
VIEW MOREReady for a WAF Alternative? Your Peers Are Too
Holy crap it’s a pain to use. Maybe I just didn’t absorb enough of the...
VIEW MOREProtect your Users from Friendly Fire in the War on Bots
In a world where malicious bots roam the internet like hungry lions seeking vulnerable applications...
VIEW MORECredential Stuffing Prevention: How to stop and mitigate credential stuffing attacks
Credential stuffing attacks are some of the most common bot-based threats facing applications...
VIEW MOREDDOS attacks and the 2020 election
Ed Amoroso, Chief Executive Officer of TAG Cyber LLC, a global cyber security advisory, training,...
VIEW MORE