Category: Threat Intelligence
What Are Bad Bots, and How to Stop Them
With up to 50 percent of Internet traffic generated by bots, organizations are awash in a sea of...
VIEW MOREFive Reasons Agentless AppSec is the Right Choice
I’m a big fan of the ThreatX agentless architecture. It simplifies many of aspects of...
VIEW MOREEliminate AppSec Sprawl
As the threat landscape has become more diverse, AppSec solutions have become increasingly...
VIEW MOREOWASP TOP 10: APIs Take Center Stage in Latest List of Priorities
OWASP recently released the first iteration of the API Security Top 10. Like the ubiquitous OWASP...
VIEW MOREFighting the AppSec Fight: Don’t sell products. Create partnerships.
It’s been a few weeks since we closed the book on another RSA conference. And as always, it...
VIEW MOREDetect & Prevent Newly Observed Malicious Automation Attacks
Just when you think you are one step ahead of hackers, they prove you wrong and set you four steps...
VIEW MORETop 4 Malicious Automation Attacks & How to Detect Them
We first introduced malicious automation in Part I of this blog series. We shared how malicious...
VIEW MOREDetecting Advanced Bots Using Active Interrogation
Last year ThreatX announced enhanced bot detection and mitigation capabilities which enabled us...
VIEW MOREMalicious Bot Detection Through A Complex Proxy Network
A malicious entity operating a botnet to execute credential stuffing or password spraying attacks...
VIEW MOREUsing a Next-Gen WAF to Identify & Prevent Carding
As more and more businesses elect to conduct business online, not only are they subject to...
VIEW MOREAPI Vulnerability Lives at the Heart of the Breach
*We are thrilled to introduce and feature David Geer on the ThreatX Blog. David is a content...
VIEW MOREMarriott’s Costly Mistake: Letting Compliance Trump Security
Friday’s news of Marriott’s massive breach sent shock waves throughout the...
VIEW MORE