Category: API Security
How to Use API Schema to Improve API Protection
What Is an API Schema? The RESTful API design pattern is in use by an overwhelming majority...
VIEW MOREWhy the Long View Matters in API Attack Protection
In API attack protection, context is key. The old-school method of looking for attack signatures...
VIEW MOREBroken Object Level Authorization (BOLA): What It Is, How ThreatX Can Help
No. 1 on the OWASP Top 10 List of Critical API Security Risks, broken object level authorization or...
VIEW MOREGet API Protection Best Practices With “The Definitive Guide to API Attack Protection”
In recent months, we’ve been fielding a lot of questions about API security from our prospects...
VIEW MOREThink Like an Attacker: How to Add Security Into API and App Development
I’m not a security professional; I’m an engineer. But when you work at a startup, you often...
VIEW MOREAnnouncing New ThreatX API Protection Capabilities
We’re pleased to announce that we have expanded and enhanced our API protection capabilities to...
VIEW MORESecurity XChange: John Brunn, CISO
Welcome to ThreatX Security Xchange – our blog series featuring security practitioners and...
VIEW MOREDemystifying API Security
We hear a lot of questions and concerns from customers and prospects these days about API security....
VIEW MOREFive Requirements for Protecting APIs Against Attacks
API security is not a new problem; APIs and their vulnerabilities have been around a long time....
VIEW MOREThreatX Security XChange: Terence Runge, CISO
Welcome to ThreatX Security XChange – our blog series featuring security practitioners and...
VIEW MOREAPI Protection vs. Security: Getting Started
Recently, I’ve been championing the idea of a “protection-first” approach when it comes to...
VIEW MOREHow Rogue and Zombie APIs Expand Your Attack Surface
Whether it’s Auth APIs controlling access to privileged business logic in web applications,...
VIEW MORE