Category: Blog
ThreatX Protect: Automated Threat Protection
As technology evolves across industries, cyber threats grow in both frequency and sophistication,...
VIEW MOREUnrestricted Access to Sensitive Business Flows
No. 6 on the 2023 OWASP API Top 10 Vulnerabilities list — Unrestricted Access to Sensitive...
VIEW MOREWhat is a DDoS Attack, and How to Protect Against it?
What Is a DDoS Attack? DDoS stands for distributed denial of service attack. It is a brute...
VIEW MOREThreatX API and Application Protection at the Edge and at Runtime: Better Together
ThreatX offers both Runtime API and Application Protection (RAAP) and ThreatX API & Application...
VIEW MOREWhy Identifying Sensitive Data in APIs Is Critical for PCI DSS and GDPR Compliance
Why Identifying Sensitive Data in APIs Is Critical for PCI DSS and GDPR Compliance Data leaks...
VIEW MOREHow to Determine Noise vs. a Targeted Attack
One of the main challenges that security operation centers (SOC) and threat hunting teams run into...
VIEW MOREMaking a Business Case for API Security: Talking Points for Speaking to the Board
It didn’t take long for API security to make the news in 2023. In January, it was reported that a...
VIEW MOREOWASP API Security Top 10 2023 Security Risks
As explained by the online community, Open Web Application Security Project (OWASP), APIs are a...
VIEW MOREAvoid This Common Phone Scam
I’ve worked in cybersecurity a long time, and over the years have learned a lot about the tactics...
VIEW MOREWhat is Mass Assignment: How We Can Help
2023 UPDATE: In the 2023 OWASP API Top 10 vulnerabilities list, Excessive Data Exposure and Mass...
VIEW MOREHTTP Request Smuggling Vulnerability in Node.js
Last week, researchers discovered an HTTP request smuggling vulnerability in Node.js. This...
VIEW MOREThe Types of API Attacks We Are Seeing
Attackers are like modern-day cartographers. The cartographers of old weren’t necessarily sailing...
VIEW MORE