Sitemap
Find the content you’re looking for on ThreatX.com
Landing Pages
- Competitive
- Use Cases
- Rapid Response
Blog Posts
- Get API Protection Best Practices With “The Definitive Guide to API Attack Protection”
- PCI DSS 4.0: New Requirement to Automate Detection and Prevention of Web-Based Attacks
- Announcing New ThreatX API Protection Capabilities
- Five Requirements for Protecting APIs Against Attacks
- How to Simplify Your API to Narrow Attack Vectors
- API Gateway Security – What kind of security do API gateways offer?
- Credential Stuffing Examples and Keys to Detection
- Why Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
- How to Simplify WAF Rule Management
- Think Like an Attacker: How to Add Security Into API and App Development
- ThreatX SOC Vulnerability Alert: CVE-2022-21449 “Psychic Signatures”
- Security XChange: John Brunn, CISO
- Demystifying API Security
- Spring4Shell: Day 1 Update and Insights
- ThreatX Response to Spring4Shell
- ThreatX Security XChange: Terence Runge, CISO
- API Protection vs. Security: Getting Started
- How Rogue and Zombie APIs Expand Your Attack Surface
- Response to Threat of Russian Cyberattacks
- New Research: How Does API Security Affect Consumers?
- Read the Fine Print: Can’t Block an API Attack? You Can’t Protect
- ThreatX Security XChange: Jeff Gardner, CISO
- How We Were Able to Help Our Customers With the Log4j 0Day
- Understanding and Preventing Account Takeover
- ThreatX Starts Off Strong in 2022
- Digital Hygiene Tip From Our SOC: Update Your Cipher Suites and Certificates
- How ThreatX Can Help Address Cyber Insurance Critical Controls
- Did You Read Our Most Popular 2021 Blog Posts?
- Starting the New Year Strong With Our New CFO!
- ThreatX Named 2022 Best Place to Work
- Log4j2: What We’ve Seen, What We Expect
- Tips From the ThreatX SOC: Managing the Log4j Vulnerability
- Log4j Update: Threat to Local Hosts – ThreatX Response
- Detecting and Blocking Log4j2: ThreatX Retro
- Cyberattacks in 2022 Will Look Familiar
- Welcome Tom Axbey to the Board of Directors!
- Log4j2 Vulnerability Mitigation at ThreatX
- Grinch Bots Wreaking Havoc This Holiday Season
- Welcome to Our New CMO!
- Credential Stuffing, DDoS Attacks, Bots, and More Create a Formidable Iceberg of Risk
- Ransomware Prevention: Beyond Phishing Awareness
- How ThreatX Lowers False Positives, Delivers Visibility, and Speeds Time to Value
- Your Best First Step in Building an Application Security Program
- From Zombie to Rogue to Shadow APIs: How to Reduce API Security Risks
- On Running Marathons and Running a Tech Startup
- How to Overcome Credit Union Cybersecurity Challenges
- New Research: Bot and DDoS Attacks on the Rise
- ThreatX Named a Visionary in 2021 Gartner® Magic Quadrant™ for Web Application and API Protection
- Ready for a WAF Alternative? Your Peers Are Too
- A CISO, a VP of Engineering, and a Threat Hunter Walk Into a BBQ …
- Shift Left vs Shift Right Security Testing
- API Catalog Capabilities a Win for Our Customers
- Visibility into API Deployment
- Sustaining our Black Hat Momentum
- With Great APIs comes Great Responsibility
- Back in Black [Hat]!
- API Security Checklist: 5 Standards for Protecting APIs
- How to Stop and Prevent Credit Card Fraud
- If all you have is a hammer…
- One stop shop
- Winning the battle against blended threats
- 2020 Net Promoter Score (NPS) Improves
- Protect your Users from Friendly Fire in the War on Bots
- Credential Stuffing Prevention: How to stop and mitigate credential stuffing attacks
- DDOS attacks and the 2020 election
- Prune the Sprawl. Get Better AppSec.
- The Many Faces of Bad Bots
- Five Reasons Agentless AppSec is the Right Choice
- Why it’s time to adopt a risk-based approach to appsec
- This Way to WAAP
- 3 Steps to Improve Your AppSec Using ThreatX and Splunk Phantom
- Making the Change to Risk-Based AppSec
- ThreatX Integrates with Cortex XSOAR by Palo Alto Networks
- You Wouldn’t Buy a Home Without an Inspection. Why Buy a Company Without One?
- Beware the WAF in WAAP Clothing
- My First 100 Days
- Meet PCI Requirements Consistently and Efficiently
- Joining the Front Lines of AppSec
- How to Cut Costs & Reduce AppSec Risk
- Eliminate AppSec Sprawl
- OWASP TOP 10: APIs Take Center Stage in Latest List of Priorities
- Fighting the AppSec Fight: Don’t sell products. Create partnerships.
- Embedded in the ThreatX SOC: My First 30 Days
- Better Security + More Efficient Ops with a Unified Approach to AppSec
- ThreatX at Black Hat 2019: Find Out How We Can Cut Through the Noise of Your Job…In More Ways Than One
- Detect & Prevent Newly Observed Malicious Automation Attacks
- Why Security Teams Need to Virtual Patch
- Top 4 Malicious Automation Attacks & How to Detect Them
- Detecting Advanced Bots Using Active Interrogation
- 2019 Application Security Priorities – Stats & Trends
- Flying Blind Into the Threat Visibility Gap
- Strengthen Your Web App Defenses Using Behavioral Analysis and Attacker Deception
- Top API Security Challenges and How to Address Them Today
- How and Why to Use APIs to Strengthen Your AppSec Strategy
- Web Application Firewalls 101 – Keywords to Bookmark
- Malicious Bot Detection Through A Complex Proxy Network
- Automation – Business Ally or Security Adversary?
- Attacks Against IoT Devices Through APIs & How to Prevent Them
- Best Practices for Automation in Cyber Security
- How to Best Protect Applications in the Cloud
- CIO Applications Names ThreatX In Top 25 Cyber Security Companies in 2019
- Beyond Basic WAF Coverage – New ThreatX Capabilities
- What is a Next-Gen WAF?
- Using a Next-Gen WAF to Identify & Prevent Carding
- API Vulnerability Lives at the Heart of the Breach
- Using Next-Gen WAFs to Solve Modern AppSec Problems
- Key Points for Building and Connecting Security-Friendly APIs
- Top 6 Questions Around API and Microservices Security, Answered
- How to Secure APIs & Microservices with a Next-Gen WAF
- A CISO’s Journey to Find a Web Application Firewall that Works
- Machine Learning in Cybersecurity – Demystifying Buzzwords & Getting to the Truth
- Using the Web App Kill Chain to Identify & Neutralize Threats
- How to Adequately Account for and Secure IoT Devices
- IoT Cloud Portals – A Modern Day Hacker’s Keys to the Kingdom
- Shifting DevOps Models and Their Impact on Application Security Tools and Strategies
- Top Cybersecurity Threats & How the WAF Must Evolve to Address Them
- 3 Hurdles Security Will Need to Clear to Succeed in a DevOps World
- Too Little Too Late: ThreatX Predicts Cyber Vulnerabilities Will Go Largely Unaddressed…with Dire Consequences
- ThreatX Recognized as a Finalist for Best Web Application Solution
- Facing the Apache Struts Vulnerability with Confidence Using ThreatX
- The Rise of the Attacker-Centric Web Application Firewall (WAF)
- Marriott’s Costly Mistake: Letting Compliance Trump Security
- The New Age of Applications and What it Means for Security
- Too Busy Tuning Your WAF to Realize You Don’t Have To?
- How to Adequately Account for and Secure IoT Devices
- Using the Web App Kill Chain to Identify & Neutralize Threats
- Tightly Coupling Applications and Security for Infinite Scale
- From White Hat Hacker to CTO – An Interview with ThreatX’s Andrew Useckas
- Using Android Proxy Browsers – Convenience without Web Application Security
- 5 Negative Impacts of Misaligned Security Strategies
- Meet ThreatX at Black Hat 2018
- X Marks the Spot: Knowing Where and When to Block Threats
- The Proliferation of Web Application Attacks – “Ain’t Nobody Got Time for That!”
- Using & Protecting Microservices – A Double-Edged Sword
- Top 7 Frequently Asked Cybersecurity Questions, Answered.
- How to Detect Botnet Traffic with Behavioral Analysis
- Unexpected Web Application Attacks: When Not to Trust Your Search Engine
- Hybrid Cloud Threat Detection
- Binary Decisions vs Active Interrogation
- Enhanced Edge Caching, Site Profiling, and Bot Capabilities
- You’re Only as Strong as the Weakest Link in Your Web App Fence