ThreatX Protect: Automated Threat Protection
As technology evolves across industries, cyber threats grow in both frequency and sophistication,...
VIEW MOREWhat is Runtime Security?
Have you ever come across the term “Runtime Security” and found yourself wondering what...
VIEW MOREUnrestricted Access to Sensitive Business Flows
No. 6 on the 2023 OWASP API Top 10 Vulnerabilities list — Unrestricted Access to Sensitive...
VIEW MOREThreatX Blocks Millions of Credential Stuffing Attempts Targeting Pet Supply Company
Bot Attackers Are Getting Harder to Detect Botnet attacks are happening more frequently than...
VIEW MOREOWASP API Security Top 10 2023 Security Risks
As explained by the online community, Open Web Application Security Project (OWASP), APIs are a...
VIEW MOREAttackers, Take the Wheel: API Vulnerabilities Found in 16 Car Brands
The dream of self-driving cars has been around since the days of the Jetsons, Knight Rider, and...
VIEW MOREThreatX Launches Robust Library of On-Demand Training
ThreatX is pleased to announce the launch of Threat Academy, an extensive library of on-demand...
VIEW MOREOmnichannel Retail: Risks and Benefits
The last two years have rocked the B-to-C world, capping a steady movement towards online shopping....
VIEW MOREInline Protection vs. Out of Band Analysis
A Confusing Menu of Options APIs have become a top target for cyberattackers, and for many...
VIEW MOREOpen Banking Forcing Prioritization of API Protection
Growth of Open Banking Open Banking Project is an open-source system that allows financial...
VIEW MOREPCI DSS 4.0: New Requirement to Automate Detection and Prevention of Web-Based Attacks
Backed by all major credit card and payment processing companies, the PCI Data Security Standard...
VIEW MOREFrom Zombie to Rogue to Shadow APIs: How to Reduce API Security Risks
With Halloween on the horizon, it seems like a good time to talk about modern applications’...
VIEW MORE