Category: Application Security
Account Takeover (ATO): Types, Detection, Prevention and Protection
In the previous installment of our blog series on the modern threat landscape, we looked at how...
VIEW MOREDigital Hygiene Tip From Our SOC: Update Your Cipher Suites and Certificates
It’s January, and most of us are hitting the gym, eating salads, and resolving to take better...
VIEW MOREHow ThreatX Can Help Address Cyber Insurance Critical Controls
Our customers often ask us for help addressing the requirements of insurers. It’s clear that...
VIEW MOREHow to Simplify Your API to Narrow Attack Vectors
More Simple = Less API Attack Vectors The bottom line is that every feature of your API is a...
VIEW MOREDid You Read Our Most Popular 2021 Blog Posts?
2021 was a big year for ThreatX. Not to brag, but we more than doubled our employees and customers,...
VIEW MOREAPI Gateway Security – What kind of security do API gateways offer?
APIs are critical building blocks of modern applications and also represent one of the...
VIEW MORELog4j2: What We’ve Seen, What We Expect
We’re about a week and a half into the release of the Log4j2 vulnerability,...
VIEW MORETips From the ThreatX SOC: Managing the Log4j Vulnerability
The Log4j vulnerability has created a lot of chaos for security professionals. While there is no...
VIEW MOREDetecting and Blocking Log4j2: ThreatX Retro
Security pros are having a week. “No rest for the weary” would be an...
VIEW MORECyberattacks in 2022 Will Look Familiar
We’re wrapping up another year and facing the inevitable questions of, what do you predict will...
VIEW MORELog4j2 Vulnerability Mitigation at ThreatX
On December 9, 2021, a vulnerability was reported in Log4j2, an open source tool widely used by...
VIEW MOREGrinch Bots Wreaking Havoc This Holiday Season
We’re right in the midst of the biggest online shopping days of the year. Add...
VIEW MORE