Tag: apis
API and App Security: Q4 2023 Snapshot
We recently analyzed data collected on the ThreatX API and Application Protection platform from...
VIEW MOREAPI Security: Purple Teaming Exercises
The first step to establishing your API security program is to obtain visibility. The proliferation...
VIEW MOREAPI Security: Blue Teaming Exercises
The first step to establishing your API security program is to obtain visibility. The proliferation...
VIEW MOREAPI Security: Red Teaming Exercises
The first step to establishing your API security program is to obtain visibility. The proliferation...
VIEW MOREHow to Discover and Document Your API Landscape
API security is more than a tool or a one-off project. Attacker tactics and techniques, and your...
VIEW MOREQ3 ThreatX Platform Data: Spotlight on the Banking Industry
In our recent analysis of our Q3 platform data, we found that the banking industry stood out in a...
VIEW MOREAPI and App Security: Q3 2023 Snapshot
We recently analyzed data collected on the ThreatX API and Application Protection platform from...
VIEW MOREUnrestricted Resource Consumption: What It Is, How We Can Help
No. 4 on the OWASP API Top 10 vulnerabilities list is unrestricted resource consumption...
VIEW MOREBroken Object Property Level Authorization: What It Is, How We Can Help
Number 3 on the 2023 OWASP API Security Top 10 list, Broken Object Property Level Authorization is...
VIEW MORETwo Most Common Brute Force Attacks We See
The ThreatX Protection-as-a-Service team sees a lot of brute force attacks – or attacks that...
VIEW MOREThreatX API and Application Protection at the Edge and at Runtime: Better Together
ThreatX offers both Runtime API and Application Protection (RAAP) and ThreatX API & Application...
VIEW MOREDefending Against Zero-Day Threats
With the dynamic and complex nature of today’s technology landscape, zero-day threats are a...
VIEW MORE