Category: Blog
Read the Fine Print: Can’t Block an API Attack? You Can’t Protect
“Can the API security tool you are pitching – on its own – stop (block) API attacks...
VIEW MOREThreatX Starts Off Strong in 2022
Start-of-the-year corporate kickoffs are always exciting and energizing. Rallying the troops,...
VIEW MOREAPI Gateway Security – What kind of security do API gateways offer?
APIs are critical building blocks of modern applications and also represent one of the...
VIEW MORECredential Stuffing Examples and Keys to Detection
Credential stuffing has become one of the most common and significant threats facing organizations...
VIEW MORELog4j Update: Threat to Local Hosts – ThreatX Response
Researchers have discovered a new attack vector that may allow an attacker to trigger the Log4j...
VIEW MORECyberattacks in 2022 Will Look Familiar
We’re wrapping up another year and facing the inevitable questions of, what do you predict will...
VIEW MOREWelcome Tom Axbey to the Board of Directors!
I’m thrilled to welcome Tom Axbey to our board of directors. His experience will prove invaluable...
VIEW MOREWhy Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
Change is an inherent part of cybersecurity as attackers constantly look for new ways to evade and...
VIEW MOREHow to Simplify WAF Rule Management
As long as web application firewalls (WAFs) have existed, security teams have struggled with tuning...
VIEW MOREWelcome to Our New CMO!
2021 has been a banner year for ThreatX. Our recent funding raise, paired with our inclusion as a...
VIEW MORECredential Stuffing, DDoS Attacks, Bots, and More Create a Formidable Iceberg of Risk
Sometimes you see a threat coming and have time to prepare – like a forecasted hurricane....
VIEW MOREHow ThreatX Lowers False Positives, Delivers Visibility, and Speeds Time to Value
We talk to a lot of security professionals about web application security, and three...
VIEW MORE