Category: Application Security
Demystifying API Security
We hear a lot of questions and concerns from customers and prospects these days about API security....
VIEW MOREHow Rogue and Zombie APIs Expand Your Attack Surface
Whether it’s Auth APIs controlling access to privileged business logic in web applications,...
VIEW MOREHow We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MOREAccount Takeover (ATO): Types, Detection, Prevention and Protection
In the previous installment of our blog series on the modern threat landscape, we looked at how...
VIEW MOREDigital Hygiene Tip From Our SOC: Update Your Cipher Suites and Certificates
It’s January, and most of us are hitting the gym, eating salads, and resolving to take better...
VIEW MOREHow ThreatX Can Help Address Cyber Insurance Critical Controls
Our customers often ask us for help addressing the requirements of insurers. It’s clear that...
VIEW MOREHow to Simplify Your API to Narrow Attack Vectors
More Simple = Less API Attack Vectors The bottom line is that every feature of your API is a...
VIEW MOREDid You Read Our Most Popular 2021 Blog Posts?
2021 was a big year for ThreatX. Not to brag, but we more than doubled our employees and customers,...
VIEW MOREAPI Gateway Security – What kind of security do API gateways offer?
APIs are critical building blocks of modern applications and also represent one of the...
VIEW MORELog4j2: What We’ve Seen, What We Expect
We’re about a week and a half into the release of the Log4j2 vulnerability,...
VIEW MORETips From the ThreatX SOC: Managing the Log4j Vulnerability
The Log4j vulnerability has created a lot of chaos for security professionals. While there is no...
VIEW MOREDetecting and Blocking Log4j2: ThreatX Retro
Security pros are having a week. “No rest for the weary” would be an...
VIEW MORE