Category: Blog
ThreatX API and Application Protection at the Edge and at Runtime: Better Together
ThreatX offers both Runtime API and Application Protection (RAAP) and ThreatX API & Application...
VIEW MOREWhy Identifying Sensitive Data in APIs Is Critical for PCI DSS and GDPR Compliance
Why Identifying Sensitive Data in APIs Is Critical for PCI DSS and GDPR Compliance Data leaks...
VIEW MOREHow to Secure APIs – 10 Best Practices to Follow
APIs (application programming interfaces) are a foundation for modern software development. They...
VIEW MOREWhat are Zero Trust APIs?
Over the past few years, APIs have become an integral part of virtually every digital...
VIEW MOREWhat is an API Attack and how to prevent them?
In October 2022—three months before becoming a billionaire manchild’s plaything—Twitter...
VIEW MOREHow to Determine Noise vs. a Targeted Attack
One of the main challenges that security operation centers (SOC) and threat hunting teams run into...
VIEW MOREMaking a Business Case for API Security: Talking Points for Speaking to the Board
It didn’t take long for API security to make the news in 2023. In January, it was reported that a...
VIEW MORECredential Stuffing: Examples, Detection and Impact
Credential stuffing has become one of the most common and significant threats facing organizations...
VIEW MOREOWASP API Security Top 10 2023 Security Risks
As explained by the online community, Open Web Application Security Project (OWASP), APIs are a...
VIEW MOREAvoid This Common Phone Scam
I’ve worked in cybersecurity a long time, and over the years have learned a lot about the tactics...
VIEW MOREAnnouncing ThreatX Labs
I’m happy to announce that ThreatX will be conducting more threat research with the formation of...
VIEW MOREWhat is Mass Assignment: How We Can Help
OWASP says of mass assignment, “Binding client provided data (e.g., JSON) to data models, without...
VIEW MORE