
News
Press releases and coverage of ThreatX in the news and around the web
- Press Releases
- News
- Coverage

Navigating the IoT Security Minefield: API Security
APIs have experienced a nearly 230% increase in the last decade. And while APIs are well suited for today's high-powered business model, they present a myriad of security challenges that must be addressed. ThreatX CTO, Andrew Useckas, highlights these challenges and discusses tips for building security-friendy APIs in an article with IoT Agenda
View More

Next Generation Firewall Adopts a Container-Based Distributed Architecture
Parongo, which distributes cloud security products in Japan and APAC, will deploy ThreatX, a next generation web application firewall (WAF). ThreatX has adopted a container-based architecture and solves many of the limitations of existing WAFs.
View More

10 Biggest Cybersecurity Predictions for 2019
Among the top 10 biggest cybersecurity predictions for 2019 is the prediction made by ThreatX executives that utilities (and other established industries) where security has not been built into will become prime targets for attackers across the globe looking to engage in cyber warfare.
View More
Too Little Too Late – ThreatX Predicts Cyber Vulnerabilities will Go Largely Unaddressed…with Dire Consequences
ThreatX today released its predictions for the cybersecurity industry in the coming year. With new vulnerabilities arising from IoT-enabled innovations, an increase in sophisticated attacks due to bots leveraging AI, and the potential for a catastrophic breach in an established sector like utilities, 2019 is shaping up to be a challenging year on the cybersecurity front.
ThreatX Selected as SC Media 2019 Trust Award Finalist
ThreatX, the leading provider of SaaS-based web application firewall (WAF) solutions, today announced that it has been recognized as a Trust Award finalist in the Web Application Solution category for the 2019 SC Awards.…

Nominated for Best Web Application Security Solution
ThreatX is honored to be nominated as a finalist for Best Web Application Security Solution amongst some great companies. Finalists were selected by an expert panel of judges with extensive knowledge and experience in the cybersecurity industry.
View More

Compliance Concerns Shouldn’t Drive Data Security Strategies
Compliance concerns certainly have their place in today's enterprise, however, they should not be viewed as interchangeable with security best practices. Far too often, the boardroom and executive teams link these two disparate disciplines - and the results can be disastrous…
View More

Cybersecurity Predictions for 2019
What will 2019 bring? Threat X Chief Strategy Officer, Bret Settle, weighs in. "Because security has not been built into established industries like utilities, these sectors are an easy target across the globe and a prime mark for attackers looking to engage in cyber warfare…"
View More

Navigating the IoT Security Minefield: Securing Device-to-Cloud Flows
Here we go again - another month, another IoT security issue in the news; this time a report by the BBC about how vulnerable MiSafes child-tracking smartwatches are to hackers…
View More

Why Compliance is Never Enough
Organizations are well aware of the security risks inherent in our hyper-connected world. However, many make the mistake of focusing their attention on being compliant rather than on ensuring that their security strategy is effective and efficient.
View More

3 DevOps Challenges that Demand a New Security Approach
Software developers and security teams have a well-known antagonistic relationship. While dev teams feel plagued by the restrictive security standards placed on them by security teams, the security teams view developers as one of the biggest threats with which they have to grapple. But as DevOps proliferates organizations, security and development teams need to overcome three core challenges…
View More

Man + Machine Cybersecurity: Machine Learning is Essential to Fighting Attacks
Something is materially broken with web application security and, as a result, critical attacks are being missed…
View More