Category: API Security
How to Secure APIs – 10 Best Practices to Follow
APIs (application programming interfaces) are a foundation for modern software development. They...
VIEW MOREAPI Architecture – Best Practices for Building APIs
With every advancement in information networking, companies are forced to take stock of their...
VIEW MOREDefending Against Zero-Day Threats
With the dynamic and complex nature of today’s technology landscape, zero-day threats are a...
VIEW MOREThreatX Teams With Highgate IT Solutions to Deliver Managed API and Application Protection to the UK Market
If you are judged by the company you keep, ThreatX could not be any more excited to announce one of...
VIEW MORENew Whitepaper: All You Need to Know About Protecting Against Runtime Threats to APIs and Applications
The log4j vulnerability highlighted the need for runtime protection for APIs and apps. As security...
VIEW MOREHow eBPF Addresses the Challenges of Runtime Threats
Runtime threats aren’t new, and runtime protection is not a new concept. But it’s been plagued...
VIEW MOREWhat is an API Attack and how to prevent them?
In October 2022—three months before becoming a billionaire manchild’s plaything—Twitter...
VIEW MOREWhy Visibility Beyond HTTP Is Key to Securing APIs and Apps
The acceleration of digital transformation initiatives and subsequent rise in API,...
VIEW MORETakeaways From the Verizon 2023 Data Breach Investigations Report
The Verizon 2023 Data Breach Investigations Report was recently released, and as always, it’s...
VIEW MOREThe Emergence of Solver Services
One thing that will always remain true for cybersecurity – it will never be static. Our...
VIEW MOREThreatX Blocks Millions of Credential Stuffing Attempts Targeting Pet Supply Company
Bot Attackers Are Getting Harder to Detect Botnet attacks are happening more frequently than...
VIEW MOREWhy Is Runtime API and Application Protection Important?
We recently unveiled our latest advancement in the evolution of API and application protection –...
VIEW MORE