
The API and Application Protection Blog
ThreatX platform updates, threat research on the latest critical CVEs and 0 days impacting APIs and web applications, alongside strategies and tactics for overcoming the challenges of modern security teams.
Subscribe for updates
Sign up for exclusive threat research, company and content updates, and the occasional fun contest.
- Blog
- Application Security
- Threat Intelligence
- News
- Product Updates
- People & Culture
- Vulnerabilities
- Cloud Security
- API Security
API Security: Red Teaming Exercises
The first step to establishing your API security program is to obtain visibility. The proliferation of APIs across a distributed infrastructure inevitably leads to API sprawl, and most organizations don’t know how many APIs they have or how they’re utilized. Developers often stand up new APIs or reuse existing ones, but much of this is […]
VIEW MORE