Category: Blog
ThreatX Protect: Automated Threat Protection
As technology evolves across industries, cyber threats grow in both frequency and sophistication,...
VIEW MOREThreatX Prevent: Vulnerability Identification & Remediation Workflows
In today’s fast-paced world, where code is continuously pushed to production, many DevSecOps...
VIEW MOREUnrestricted Access to Sensitive Business Flows
No. 6 on the 2023 OWASP API Top 10 Vulnerabilities list — Unrestricted Access to Sensitive...
VIEW MOREWhat is a DDoS Attack, and How to Protect Against it?
What Is a DDoS Attack? DDoS stands for distributed denial of service attack. It is a brute...
VIEW MOREWhat are cybersecurity risks? Types and Solutions
When you think of a cybersecurity risk, you probably think of things like data breach, malware,...
VIEW MOREThreatX API and Application Protection at the Edge and at Runtime: Better Together
ThreatX offers both Runtime API and Application Protection (RAAP) and ThreatX API & Application...
VIEW MOREWhy Identifying Sensitive Data in APIs Is Critical for PCI DSS and GDPR Compliance
Why Identifying Sensitive Data in APIs Is Critical for PCI DSS and GDPR Compliance Data leaks...
VIEW MOREHow to Secure APIs – 10 Best Practices to Follow
APIs (application programming interfaces) are a foundation for modern software development. They...
VIEW MOREWhat are Zero Trust APIs?
Over the past few years, APIs have become an integral part of virtually every digital...
VIEW MOREWhat is an API Attack and how to prevent them?
In October 2022—three months before becoming a billionaire manchild’s plaything—Twitter...
VIEW MOREHow to Determine Noise vs. a Targeted Attack
One of the main challenges that security operation centers (SOC) and threat hunting teams run into...
VIEW MOREMaking a Business Case for API Security: Talking Points for Speaking to the Board
It didn’t take long for API security to make the news in 2023. In January, it was reported that a...
VIEW MORE