Tag: Application & Hybrid Cloud Security
Omnichannel Retail: Risks and Benefits
The last two years have rocked the B-to-C world, capping a steady movement towards online shopping....
VIEW MOREInline Protection vs. Out of Band Analysis
A Confusing Menu of Options APIs have become a top target for cyberattackers, and for many...
VIEW MOREBrute Force Attacks: What They Are, How They Work, How to Prevent Them
While brute force attacks aren’t new, they’re still one of the go-to methods for...
VIEW MOREWhat is BOLA – Broken Object Level Authorization?
No. 1 on the 2023 OWASP Top 10 List of Critical API Security Risks, broken object level...
VIEW MOREGet API Protection Best Practices With “The Definitive Guide to API Attack Protection”
In recent months, we’ve been fielding a lot of questions about API security from our prospects...
VIEW MOREPCI DSS 4.0: New Requirement to Automate Detection and Prevention of Web-Based Attacks
Backed by all major credit card and payment processing companies, the PCI Data Security Standard...
VIEW MOREThink Like an Attacker: How to Add Security Into API and App Development
I’m not a security professional; I’m an engineer. But when you work at a startup, you often...
VIEW MOREThreatX SOC Vulnerability Alert: CVE-2022-21449 “Psychic Signatures”
Earlier this week, the ThreatX SOC deployed a rule to protect our client base from a newly...
VIEW MORESecurity XChange: John Brunn, CISO
Welcome to ThreatX Security Xchange – our blog series featuring security practitioners and...
VIEW MOREDemystifying API Security
We hear a lot of questions and concerns from customers and prospects these days about API security....
VIEW MOREThreatX Security XChange: Terence Runge, CISO
Welcome to ThreatX Security XChange – our blog series featuring security practitioners and...
VIEW MOREHow Rogue and Zombie APIs Expand Your Attack Surface
Whether it’s Auth APIs controlling access to privileged business logic in web applications,...
VIEW MORE