Category: API Security
How to Secure APIs – 10 Best Practices to Follow
APIs (application programming interfaces) are a foundation for modern software development. They...
VIEW MOREAPI Architecture – Best Practices for Building APIs
With every advancement in information networking, companies are forced to take stock of their...
VIEW MOREDefending Against Zero-Day Threats
With the dynamic and complex nature of today’s technology landscape, zero-day threats are a...
VIEW MORENew Whitepaper: All You Need to Know About Protecting Against Runtime Threats to APIs and Applications
The log4j vulnerability highlighted the need for runtime protection for APIs and apps. As security...
VIEW MORETakeaways From the Verizon 2023 Data Breach Investigations Report
The Verizon 2023 Data Breach Investigations Report was recently released, and as always, it’s...
VIEW MOREThe Emergence of Solver Services
One thing that will always remain true for cybersecurity – it will never be static. Our...
VIEW MOREThreatX Blocks Millions of Credential Stuffing Attempts Targeting Pet Supply Company
Bot Attackers Are Getting Harder to Detect Botnet attacks are happening more frequently than...
VIEW MOREHow to Identify Distributed Botnet-Based Attacks
Botnet-based attacks like credential stuffing are occurring more often because credentials are...
VIEW MOREWhat Security Misconfiguration Is, and How We Can Help
No. 8 on the 2023 OWASP API Top 10 vulnerabilities list is security misconfiguration. Vulnerability...
VIEW MOREHow to Determine Noise vs. a Targeted Attack
One of the main challenges that security operation centers (SOC) and threat hunting teams run into...
VIEW MOREMaking a Business Case for API Security: Talking Points for Speaking to the Board
It didn’t take long for API security to make the news in 2023. In January, it was reported that a...
VIEW MOREDetailed Look at a Real-World Credential Stuffing Event
Credential stuffing attack events are becoming increasingly common against organizations of every...
VIEW MORE