Category: Blog
API Gateway Security – What kind of security do API gateways offer?
APIs are critical building blocks of modern applications and also represent one of the...
VIEW MORELog4j Update: Threat to Local Hosts – ThreatX Response
Researchers have discovered a new attack vector that may allow an attacker to trigger the Log4j...
VIEW MORECyberattacks in 2022 Will Look Familiar
We’re wrapping up another year and facing the inevitable questions of, what do you predict will...
VIEW MOREWelcome Tom Axbey to the Board of Directors!
I’m thrilled to welcome Tom Axbey to our board of directors. His experience will prove invaluable...
VIEW MOREWhy Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
Change is an inherent part of cybersecurity as attackers constantly look for new ways to evade and...
VIEW MOREHow to Simplify WAF Rule Management
As long as web application firewalls (WAFs) have existed, security teams have struggled with tuning...
VIEW MOREWelcome to Our New CMO!
2021 has been a banner year for ThreatX. Our recent funding raise, paired with our inclusion as a...
VIEW MORECredential Stuffing, DDoS Attacks, Bots, and More Create a Formidable Iceberg of Risk
Sometimes you see a threat coming and have time to prepare – like a forecasted hurricane....
VIEW MOREHow ThreatX Lowers False Positives, Delivers Visibility, and Speeds Time to Value
We talk to a lot of security professionals about web application security, and three...
VIEW MOREFrom Zombie to Rogue to Shadow APIs: How to Reduce API Security Risks
With Halloween on the horizon, it seems like a good time to talk about modern applications’...
VIEW MORE