Tag: Application & Hybrid Cloud Security
API and App Security: Q4 2023 Snapshot
We recently analyzed data collected on the ThreatX API and Application Protection platform from...
VIEW MORECisco Acquires Isovalent, Creator of eBPF: Why It Matters
Cisco recently announced its intent to acquire Isovalent, which was founded by the creators of...
VIEW MOREHow to Discover and Document Your API Landscape
API security is more than a tool or a one-off project. Attacker tactics and techniques, and your...
VIEW MOREQ3 ThreatX Platform Data: Spotlight on the Banking Industry
In our recent analysis of our Q3 platform data, we found that the banking industry stood out in a...
VIEW MOREAPI and App Security: Q3 2023 Snapshot
We recently analyzed data collected on the ThreatX API and Application Protection platform from...
VIEW MORETwo Most Common Brute Force Attacks We See
The ThreatX Protection-as-a-Service team sees a lot of brute force attacks – or attacks that...
VIEW MOREThreatX API and Application Protection at the Edge and at Runtime: Better Together
ThreatX offers both Runtime API and Application Protection (RAAP) and ThreatX API & Application...
VIEW MOREDefending Against Zero-Day Threats
With the dynamic and complex nature of today’s technology landscape, zero-day threats are a...
VIEW MORENew Whitepaper: All You Need to Know About Protecting Against Runtime Threats to APIs and Applications
The log4j vulnerability highlighted the need for runtime protection for APIs and apps. As security...
VIEW MOREThe Emergence of Solver Services
One thing that will always remain true for cybersecurity – it will never be static. Our...
VIEW MOREThreatX Blocks Millions of Credential Stuffing Attempts Targeting Pet Supply Company
Bot Attackers Are Getting Harder to Detect Botnet attacks are happening more frequently than...
VIEW MOREHow to Identify Distributed Botnet-Based Attacks
Botnet-based attacks like credential stuffing are occurring more often because credentials are...
VIEW MORE