Category: API Security
Application Security Should be Revamped
Application Security is at the stage of evolution when its traditional technologies have reached...
VIEW MOREUnrestricted Access to Sensitive Business Flows
No. 6 on the 2023 OWASP API Top 10 Vulnerabilities list — Unrestricted Access to Sensitive...
VIEW MOREAPI and App Security: Q4 2023 Snapshot
We recently analyzed data collected on the ThreatX API and Application Protection platform from...
VIEW MOREAPI Security: Purple Teaming Exercises
The first step to establishing your API security program is to obtain visibility. The proliferation...
VIEW MOREAPI Security: Blue Teaming Exercises
The first step to establishing your API security program is to obtain visibility. The proliferation...
VIEW MOREAPI Security: Red Teaming Exercises
The first step to establishing your API security program is to obtain visibility. The proliferation...
VIEW MORECisco Acquires Isovalent, Creator of eBPF: Why It Matters
Cisco recently announced its intent to acquire Isovalent, which was founded by the creators of...
VIEW MOREHow to Discover and Document Your API Landscape
API security is more than a tool or a one-off project. Attacker tactics and techniques, and your...
VIEW MOREQ3 ThreatX Platform Data: Spotlight on the Banking Industry
In our recent analysis of our Q3 platform data, we found that the banking industry stood out in a...
VIEW MOREAPI and App Security: Q3 2023 Snapshot
We recently analyzed data collected on the ThreatX API and Application Protection platform from...
VIEW MOREUnrestricted Resource Consumption: What It Is, How We Can Help
No. 4 on the OWASP API Top 10 vulnerabilities list is unrestricted resource consumption...
VIEW MOREBroken Object Property Level Authorization: What It Is, How We Can Help
Number 3 on the 2023 OWASP API Security Top 10 list, Broken Object Property Level Authorization is...
VIEW MORE