Tag: Application & Hybrid Cloud Security
Broken Object Level Authorization (BOLA): What It Is, How ThreatX Can Help
No. 1 on the OWASP Top 10 List of Critical API Security Risks, broken object level authorization or...
VIEW MOREGet API Protection Best Practices With “The Definitive Guide to API Attack Protection”
In recent months, we’ve been fielding a lot of questions about API security from our prospects...
VIEW MOREPCI DSS 4.0: New Requirement to Automate Detection and Prevention of Web-Based Attacks
Backed by all major credit card and payment processing companies, the PCI Data Security Standard...
VIEW MOREThink Like an Attacker: How to Add Security Into API and App Development
I’m not a security professional; I’m an engineer. But when you work at a startup, you often...
VIEW MOREThreatX SOC Vulnerability Alert: CVE-2022-21449 “Psychic Signatures”
Earlier this week, the ThreatX SOC deployed a rule to protect our client base from a newly...
VIEW MORESecurity XChange: John Brunn, CISO
Welcome to ThreatX Security Xchange – our blog series featuring security practitioners and...
VIEW MOREDemystifying API Security
We hear a lot of questions and concerns from customers and prospects these days about API security....
VIEW MOREThreatX Security XChange: Terence Runge, CISO
Welcome to ThreatX Security XChange – our blog series featuring security practitioners and...
VIEW MOREHow Rogue and Zombie APIs Expand Your Attack Surface
Whether it’s Auth APIs controlling access to privileged business logic in web applications,...
VIEW MOREThreatX Security XChange: Jeff Gardner, CISO
Welcome to ThreatX Security XChange – our blog series featuring security practitioners and...
VIEW MOREHow We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MOREAccount Takeover (ATO): Types, Detection, Prevention and Protection
In the previous installment of our blog series on the modern threat landscape, we looked at how...
VIEW MORE