Tag: apis
Announcing New ThreatX API Protection Capabilities
We’re pleased to announce that we have expanded and enhanced our API protection capabilities to...
VIEW MOREDemystifying API Security
We hear a lot of questions and concerns from customers and prospects these days about API security....
VIEW MOREFive Requirements for Protecting APIs Against Attacks
API security is not a new problem; APIs and their vulnerabilities have been around a long time....
VIEW MOREAPI Protection vs. Security: Getting Started
Recently, I’ve been championing the idea of a “protection-first” approach when it comes to...
VIEW MOREHow Rogue and Zombie APIs Expand Your Attack Surface
Whether it’s Auth APIs controlling access to privileged business logic in web applications,...
VIEW MORENew Research: How Does API Security Affect Consumers?
There’s a lot of talk about APIs and their security, or lack thereof, in the infosec community....
VIEW MORERead the Fine Print: Can’t Block an API Attack? You Can’t Protect
“Can the API security tool you are pitching – on its own – stop (block) API attacks...
VIEW MOREHow We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MOREAccount Takeover (ATO): Types, Detection, Prevention and Protection
In the previous installment of our blog series on the modern threat landscape, we looked at how...
VIEW MOREDigital Hygiene Tip From Our SOC: Update Your Cipher Suites and Certificates
It’s January, and most of us are hitting the gym, eating salads, and resolving to take better...
VIEW MOREHow ThreatX Can Help Address Cyber Insurance Critical Controls
Our customers often ask us for help addressing the requirements of insurers. It’s clear that...
VIEW MOREHow to Simplify Your API to Narrow Attack Vectors
More Simple = Less API Attack Vectors The bottom line is that every feature of your API is a...
VIEW MORE