Category: Application Security
Omnichannel Retail: Risks and Benefits
The last two years have rocked the B-to-C world, capping a steady movement towards online shopping....
VIEW MOREPro-Russian Hacker Group, Killnet, Attacking US Government Sites
As the war between Russia and Ukraine rages on, so do the cyberattacks against Ukraine and its NATO...
VIEW MOREInline Protection vs. Out of Band Analysis
A Confusing Menu of Options APIs have become a top target for cyberattackers, and for many...
VIEW MOREBrute Force Attacks: What They Are, How They Work, How to Prevent Them
While brute force attacks aren’t new, they’re still one of the go-to methods for...
VIEW MOREThe Types of API Attacks We Are Seeing
Attackers are like modern-day cartographers. The cartographers of old weren’t necessarily sailing...
VIEW MOREA Look at Popular Botnets and How to Stop Them
A botnet is simply, as the name implies, a network of bots. Attackers conscript many computers into...
VIEW MOREThreatX Named in 2022 Magic Quadrant™ for Cloud Web App and API Protection for Second Consecutive Year
I am pleased to announce that ThreatX has been recognized by Gartner® in the Magic Quadrant™...
VIEW MOREWhy Do You Need a WAF For Your Websites?
Businesses have to worry about different kinds of cyberattacks, many of which could bring down...
VIEW MOREWhy the Long View Matters in API Attack Protection
In API attack protection, context is key. The old-school method of looking for attack signatures...
VIEW MOREWhat is BOLA – Broken Object Level Authorization?
No. 1 on the 2023 OWASP Top 10 List of Critical API Security Risks, broken object level...
VIEW MOREPCI DSS 4.0: New Requirement to Automate Detection and Prevention of Web-Based Attacks
Backed by all major credit card and payment processing companies, the PCI Data Security Standard...
VIEW MOREThink Like an Attacker: How to Add Security Into API and App Development
I’m not a security professional; I’m an engineer. But when you work at a startup, you often...
VIEW MORE