Category: Threat Intelligence
DDOS attacks and the 2020 election
Ed Amoroso, Chief Executive Officer of TAG Cyber LLC, a global cyber security advisory, training,...
VIEW MOREPrune the Sprawl. Get Better AppSec.
“We are all just prisoners here of our own device.“ –The Eagles “Help me...
VIEW MOREWhat Are Bad Bots, and How to Stop Them
With up to 50 percent of Internet traffic generated by bots, organizations are awash in a sea of...
VIEW MOREFive Reasons Agentless AppSec is the Right Choice
I’m a big fan of the ThreatX agentless architecture. It simplifies many of aspects of...
VIEW MOREEliminate AppSec Sprawl
As the threat landscape has become more diverse, AppSec solutions have become increasingly...
VIEW MOREOWASP TOP 10: APIs Take Center Stage in Latest List of Priorities
OWASP recently released the first iteration of the API Security Top 10. Like the ubiquitous OWASP...
VIEW MOREFighting the AppSec Fight: Don’t sell products. Create partnerships.
It’s been a few weeks since we closed the book on another RSA conference. And as always, it...
VIEW MOREDetect & Prevent Newly Observed Malicious Automation Attacks
Just when you think you are one step ahead of hackers, they prove you wrong and set you four steps...
VIEW MORETop 4 Malicious Automation Attacks & How to Detect Them
We first introduced malicious automation in Part I of this blog series. We shared how malicious...
VIEW MOREDetecting Advanced Bots Using Active Interrogation
Last year ThreatX announced enhanced bot detection and mitigation capabilities which enabled us...
VIEW MOREMalicious Bot Detection Through A Complex Proxy Network
A malicious entity operating a botnet to execute credential stuffing or password spraying attacks...
VIEW MOREUsing a Next-Gen WAF to Identify & Prevent Carding
As more and more businesses elect to conduct business online, not only are they subject to...
VIEW MORE