Category: Threat Intelligence
API Vulnerability Lives at the Heart of the Breach
*We are thrilled to introduce and feature David Geer on the ThreatX Blog. David is a content...
VIEW MOREMarriott’s Costly Mistake: Letting Compliance Trump Security
Friday’s news of Marriott’s massive breach sent shock waves throughout the...
VIEW MOREUsing the Web App Kill Chain to Identify & Neutralize Threats
There is an ongoing debate among security professionals surrounding the most effective ways to...
VIEW MOREX Marks the Spot: Knowing Where and When to Block Threats
We need to face reality – web application protection is incredibly challenging in the agile,...
VIEW MOREHow to Detect Botnet Traffic with Behavioral Analysis
The following is the first post in a three-part series surrounding bot detection and neutralization...
VIEW MOREUnexpected Web Application Attacks: When Not to Trust Your Search Engine
In today’s complex cybersecurity landscape, it is very apparent that threats can and will...
VIEW MOREHybrid Cloud Threat Detection
Despite its theoretical conception in the 1960s1, cloud computing has only truly emerged and taken...
VIEW MORE