Tag: apis
How to Use API Schema to Improve API Protection
What Is an API Schema? The RESTful API design pattern is in use by an overwhelming majority...
VIEW MOREWhy the Long View Matters in API Attack Protection
In API attack protection, context is key. The old-school method of looking for attack signatures...
VIEW MOREWhat is BOLA – Broken Object Level Authorization?
No. 1 on the 2023 OWASP Top 10 List of Critical API Security Risks, broken object level...
VIEW MOREGet API Protection Best Practices With “The Definitive Guide to API Attack Protection”
In recent months, we’ve been fielding a lot of questions about API security from our prospects...
VIEW MOREAnnouncing New ThreatX API Protection Capabilities
We’re pleased to announce that we have expanded and enhanced our API protection capabilities to...
VIEW MORESecurity XChange: John Brunn, CISO
Welcome to ThreatX Security Xchange – our blog series featuring security practitioners and...
VIEW MOREDemystifying API Security
We hear a lot of questions and concerns from customers and prospects these days about API security....
VIEW MOREFive Requirements for Protecting APIs Against Attacks
API security is not a new problem; APIs and their vulnerabilities have been around a long time....
VIEW MOREThreatX Security XChange: Terence Runge, CISO
Welcome to ThreatX Security XChange – our blog series featuring security practitioners and...
VIEW MOREAPI Protection vs. Security: Getting Started
Recently, I’ve been championing the idea of a “protection-first” approach when it comes to...
VIEW MOREHow Rogue and Zombie APIs Expand Your Attack Surface
Whether it’s Auth APIs controlling access to privileged business logic in web applications,...
VIEW MORENew Research: How Does API Security Affect Consumers?
There’s a lot of talk about APIs and their security, or lack thereof, in the infosec community....
VIEW MORE