Tag: Application & Hybrid Cloud Security
ThreatX Security XChange: Jeff Gardner, CISO
Welcome to ThreatX Security XChange – our blog series featuring security practitioners and...
VIEW MOREHow We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MOREAccount Takeover (ATO): Types, Detection, Prevention and Protection
In the previous installment of our blog series on the modern threat landscape, we looked at how...
VIEW MOREDigital Hygiene Tip From Our SOC: Update Your Cipher Suites and Certificates
It’s January, and most of us are hitting the gym, eating salads, and resolving to take better...
VIEW MOREHow ThreatX Can Help Address Cyber Insurance Critical Controls
Our customers often ask us for help addressing the requirements of insurers. It’s clear that...
VIEW MOREHow to Simplify Your API to Narrow Attack Vectors
More Simple = Less API Attack Vectors The bottom line is that every feature of your API is a...
VIEW MOREDid You Read Our Most Popular 2021 Blog Posts?
2021 was a big year for ThreatX. Not to brag, but we more than doubled our employees and customers,...
VIEW MOREAPI Gateway Security – What kind of security do API gateways offer?
APIs are critical building blocks of modern applications and also represent one of the...
VIEW MORELog4j2: What We’ve Seen, What We Expect
We’re about a week and a half into the release of the Log4j2 vulnerability,...
VIEW MORETips From the ThreatX SOC: Managing the Log4j Vulnerability
The Log4j vulnerability has created a lot of chaos for security professionals. While there is no...
VIEW MOREDetecting and Blocking Log4j2: ThreatX Retro
Security pros are having a week. “No rest for the weary” would be an...
VIEW MORECyberattacks in 2022 Will Look Familiar
We’re wrapping up another year and facing the inevitable questions of, what do you predict will...
VIEW MORE