Category: Product Updates
Application Security Should be Revamped
Application Security is at the stage of evolution when its traditional technologies have reached...
VIEW MOREWhy Identifying Sensitive Data in APIs Is Critical for PCI DSS and GDPR Compliance
Why Identifying Sensitive Data in APIs Is Critical for PCI DSS and GDPR Compliance Data leaks...
VIEW MOREWhy Is Runtime API and Application Protection Important?
We recently unveiled our latest advancement in the evolution of API and application protection –...
VIEW MOREThreatX Launches Robust Library of On-Demand Training
ThreatX is pleased to announce the launch of Threat Academy, an extensive library of on-demand...
VIEW MOREAnnouncing New ThreatX API Protection Capabilities
We’re pleased to announce that we have expanded and enhanced our API protection capabilities to...
VIEW MOREWith Great APIs comes Great Responsibility
Evolution of API Development Enterprises continuously adopt new development methods, techniques and...
VIEW MOREBack in Black [Hat]!
After a brief, pandemic-induced hiatus last year, ThreatX will be attending Black Hat 2021 in...
VIEW MORECredential Stuffing Prevention: How to stop and mitigate credential stuffing attacks
Credential stuffing attacks are some of the most common bot-based threats facing applications...
VIEW MOREFive Reasons Agentless AppSec is the Right Choice
I’m a big fan of the ThreatX agentless architecture. It simplifies many of aspects of...
VIEW MOREWhy it’s time to adopt a risk-based approach to appsec
Most anyone who works in application security can tell you that the traditional WAF model has not...
VIEW MORE3 Steps to Improve Your AppSec Using ThreatX and Splunk Phantom
Modern AppSec and security teams face enormous challenges of scale when it comes to their daily...
VIEW MORE