Category: Application Security
ThreatX Named in 2022 Magic Quadrant™ for Cloud Web App and API Protection for Second Consecutive Year
I am pleased to announce that ThreatX has been recognized by Gartner® in the Magic Quadrant™...
VIEW MOREWhy Do You Need a WAF For Your Websites?
Businesses have to worry about different kinds of cyberattacks, many of which could bring down...
VIEW MOREWhy the Long View Matters in API Attack Protection
In API attack protection, context is key. The old-school method of looking for attack signatures...
VIEW MOREWhat is BOLA – Broken Object Level Authorization?
No. 1 on the 2023 OWASP Top 10 List of Critical API Security Risks, broken object level...
VIEW MOREPCI DSS 4.0: New Requirement to Automate Detection and Prevention of Web-Based Attacks
Backed by all major credit card and payment processing companies, the PCI Data Security Standard...
VIEW MOREThink Like an Attacker: How to Add Security Into API and App Development
I’m not a security professional; I’m an engineer. But when you work at a startup, you often...
VIEW MORESecurity XChange: John Brunn, CISO
Welcome to ThreatX Security Xchange – our blog series featuring security practitioners and...
VIEW MOREDemystifying API Security
We hear a lot of questions and concerns from customers and prospects these days about API security....
VIEW MOREThreatX Security XChange: Terence Runge, CISO
Welcome to ThreatX Security XChange – our blog series featuring security practitioners and...
VIEW MOREHow Rogue and Zombie APIs Expand Your Attack Surface
Whether it’s Auth APIs controlling access to privileged business logic in web applications,...
VIEW MOREThreatX Security XChange: Jeff Gardner, CISO
Welcome to ThreatX Security XChange – our blog series featuring security practitioners and...
VIEW MOREHow We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MORE