How to Use API Schema to Improve API Protection
What Is an API Schema? The RESTful API design pattern is in use by an overwhelming majority...
VIEW MOREDemystifying API Security
We hear a lot of questions and concerns from customers and prospects these days about API security....
VIEW MOREAPI Protection vs. Security: Getting Started
Recently, I’ve been championing the idea of a “protection-first” approach when it comes to...
VIEW MOREHow Rogue and Zombie APIs Expand Your Attack Surface
Whether it’s Auth APIs controlling access to privileged business logic in web applications,...
VIEW MOREHow We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MOREWhy Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
Change is an inherent part of cybersecurity as attackers constantly look for new ways to evade and...
VIEW MOREYour Best First Step in Building an Application Security Program
Application security is critical, and it’s complicated. To be successful, it requires...
VIEW MOREA CISO, a VP of Engineering, and a Threat Hunter Walk Into a BBQ …
Security is tough. It’s a big job that’s always getting bigger. More...
VIEW MOREShift Left vs Shift Right Security Testing
Shift Left. No wait, shift right! No, LEFT… Oh no, you just got...
VIEW MOREAPI Security Checklist: 5 Standards for Protecting APIs
Note: We have an updated deep dive resource on api security here! These days, it seems like every...
VIEW MOREWinning the battle against blended threats
We’re watching evolution in real-time. The bad guys have industrialized the attack toolbox....
VIEW MOREFive Reasons Agentless AppSec is the Right Choice
I’m a big fan of the ThreatX agentless architecture. It simplifies many of aspects of...
VIEW MORE