Sitemap
Find the content you’re looking for on ThreatX.com
Landing Pages
- Competitive
- Use Cases
- Rapid Response
Resources
- Webinar: Defining Observability in Application Security
- Beware of Zombie and Shadow APIs: The Hidden Theats Lurking in your Systems
- ThreatX to the Rescue: Vulnerability Chaos Controlled
- Zooming Out on API Security Panel Discussion: Defenders vs. Adversaries
- ThreatX Protect
- eBPF-powered Runtime Observability & Vulnerability Management
- TX Prevent – Always-Active API Security Demo
- ThreatX Protects Oncology-focused BioTech Company’s Websites from Advanced Attacks
- Techstrong TV Interview: Protecting the App and API Attack Surface
- Guide to Getting Started With API Security
- Lessons of Log4j: The Case for Runtime Protection
- ThreatX Data on API and App Security: Q3 2023
- PowerPoint Template: Making the Case for API Security
- ThreatX and Kubernetes: An Interview With Bret Settle and VMBlog
- Retailer With Small Security Team Gets Detailed Threat Visibility and Powerful App Protection With ThreatX
- API Protection for Modern Threats
- How to Build an API Security Program
- 2023 Gartner® Market Guide for Cloud Web Application and API Protection
- EMA Report: Elevating API Security with ThreatX’s Sensitive Data Exposure Capabilities
- ThreatX Consumer Survey on 2024 Cybersecurity Predictions
- ThreatX Protection-as-a-Service: What it is, what it does
- Platform Demo: Securing Sensitive Data From Advanced Threats
- Global Survey: Consumer Thoughts on Cybersecurity Skills Gap
- Platform Demo: Observe Threats Running Beyond HTTP
- All You Need to Know About Protecting Against Runtime Threats to APIs and Applications
- ThreatX Gives Leading Critical Infrastructure Supplier Confidence That Customer Data Is Safe
- Platform Demo: Blocking Credential Stuffing at Scale
- From APIs & Apps to Containers & Microservices: State of AppSec in 2023
- UK Survey: Cybersecurity Gaps During Summer Months
- Global Survey: Cybersecurity Gaps During Summer Months
- CISOs in the Boardroom – eXploring cybersecurity E03
- Better Together: ThreatX and Lumen
- Platform Demo: GraphQL Protection
- eXploring cybersecurity Episode 2
- Infographic: Anatomy of a Distributed Credential Stuffing Attack
- Platform Demo: API Catalog 2.0 & Botnet Console
- Runtime API and Application Protection Democast
- ThreatX Prevent
- Survey Results: The Human Impact of Data Breaches
- eXploring Cybersecurity E01
- What You Need to Know About Multi-Vector API Attacks
- Live Q&A: How to Identify and Block Credential Stuffing Attacks
- Botnets, DDoS and Deception – The API Threat Landscape
- Left, Right and In Between: Thinking API Security
- ThreatX Platform Demo: Detecting & Blocking Attackers
- From ThreatX Labs: Anatomy of a Targeted Credential Stuffing Attack
- From ThreatX Labs: Trends in Credential Stuffing and How to Identify It
- ThreatX Platform vs. AWS & Microsoft Azure WAF
- Exclusive Platform Demo
- 2023 InfoSec Predictions and Strategies
- Bot Management: Stop bot attacks and other forms of malicious traffic automation
- Live Q&A: Threats of 2023
- Live Q&A: Giving Thanks to CISOs
- Live Q&A: Uncovering Modern Web Application Attacks with Dolev Farhi and Nick Aleks
- The Role of Bots in API Attacks
- Interview With ThreatX CEO Gene Fay
- Anatomy of an API Attack
- Live Q&A: Combat Credential Stuffing and Account Takeover
- Live Q&A: The evolution to record breaking DDoS
- 2022 Gartner® Magic Quadrant™ for Web Application & API Protection
- ThreatX Platform Demo
- Live Q&A: Secure APIs with Tanya Janca
- Financial Services: Effectively Protect Open Banking and Financial APIs
- Live Q&A: Hacking APIs with Corey Ball
- Live Q&A: Malicious Bots in Modern Threats
- An Attacker-Centric Approach to API and Web Application Security Using ThreatX
- Why an Attacker-Centric Approach Is Key to API Protection
- Piecemeal Approaches to API Security Put Organizations in the Crosshairs
- The Definitive Guide to API Attack Protection
- Live Q&A: API Attack Surface Awareness and Management
- Trends in Modern Application Protection
- Executive Brief: 2022 Cyberthreat Defense Report
- Key Insights from CyberEdge’s 2022 Cyberthreat Defense Report
- Infographic: Insights From the 2022 Cyberthreat Defense Report
- The Buyer’s Checklist for API Protection Solutions
- CyberEdge 2022 Cyberthreat Defense Report
- A Security Practitioner’s Introduction to API Protection
- 5 Requirements for Protecting APIs Against Attacks
- API Attack Protection vs. API Gateways and AppSec Scanning Solutions
- ThreatX Protects Segpay’s Apps and APIs With Accuracy and Visibility
- ThreatX in 60 Seconds
- 2022 Log4Shell Vulnerability Solutions Forum – SANS Institute
- API Attack Protection: Don’t Overlook Your #1 Attack Vector
- Global Marketing Company Blocks Suspicious Traffic Without Excessive Rule Tuning
- Battling the Rapidly Evolving Threat Landscape: Practical Insights
- API Protection: The New Frontier
- Attack-Ready APIs: Building Security into Your APIs and Web Apps
- API [In]Security: The Consumer Perspective
- The Modern Threat Landscape Iceberg
- ThreatX API Threat Protection
- ThreatX Effectively Blocks Financial Services Credential Stuffing Attacks
- Cyber Insurance Critical Controls: How ThreatX Can Help
- API Attacks 101: ThreatX SnackAttack
- Defending Against Complex Mixed-Mode Threats
- Log4j2 | ThreatX Response Activity Discussion
- ThreatX Gives SELCO Community Credit Union’s IT Team the Watchdog It Was Looking For
- Infographic: The Modern Threat Landscape
- What You Need to Know About the Modern Threat Landscape
- ESG Technical Validation of the ThreatX WAAP Platform
- Modernizing Web Application and API Security with ThreatX
- Essential Considerations for WAAP Success
- Security Weekly Interview | ThreatX at DEFCON 26
- BMC Relies on ThreatX to Protect its Apps Across a Multi-Cloud Environment
- ThreatX Protection as a Service
- ThreatX Platform Overview
- Automating Investigation and Defense with ThreatX and Cortex XSOAR
- Automating Investigation and Defense with ThreatX and Splunk Phantom
- Credential Stuffing: What You Should Know
- Rust Rocks! Why ThreatX Chose Rust
- Your Current Approach to Threat Detection & Neutralization is Broken
- Web Application Protection for the Modern Era
- Using a Next Gen WAF to Effectively Protect APIs and Microservices
- Strengthen Web App Defenses Using Behavioral Analysis Attacker Deception
- Modern Appsec Tools For Modern Appsec Challenges Next Gen WAF
- Machine Learning & Risk Engines for Security Data Analysis Webinar
- Lessons From The Front Lines Of Appsec
- Implementing A Full Spectrum Approach To Appsec
- How to Make Cybersecurity Effective, Practical, & Scalable
- How to Avoid the Top 3 Pitfalls of Reputation-Based WAFs
- How Effective Is Your WAF Protection
- Everything I Knew and Wanted to Forget About Legacy Web Application Firewalls (WAFs)
- Designing Appsec in the Age of APIs and Microservices
- Beyond Signatures & Anomalies
- The APPSEC Kill-Chain Evolved
- DDoS Protection: Fully Integrated Protection That Scales
- WAF to WAAP | A 3-Step Plan to Modernize Your AppSec
- Application Security Evolved
- Peer Review | “Truly Outstanding Support and Next Generation WAAP Suite”
- Peer Review | “Instant Value. There is No Better WAF for the Small to Mid-Sized Business”
- Peer Review | “Good Experience with Support and Service”
- Peer Review | “Great Product, Service and Customer Service”
- Peer Review | “Finally, an Effective WAF that is Straightforward to Deploy and Maintain”
- Peer Review | “Got Our Evenings and Weekends Back with ThreatX!”
- Peer Review | “One of the Better Investments We’ve Made, Continue to Mature”
- Peer Review | “A Big Leap Forward to Address Weakness in Aging WAF Solution”
- Peer Review | “Fantastic SaaS WAF Solution!”
- Peer Review | “ThreatX WAF”
- Peer Review | “ThreatX a Powerful Product with Excellent API and Web Application Protection”
- Peer Review | “Staying Ahead of Possible Threats”
- Peer Review | “Great Company and Organization to Work With. Easy to Deploy and Manage WAF Solution”
- Peer Review | “Have Been Pleased with the Products, Services, and Continued Growth”
- Peer Review | “Awesome WAF and Support”
- Peer Review | “Great Improvements in WAF Protection and Service, Eliminating False Positives”
- Peer Review | “Razor Sharp Technology Right at Your Finger Tips”
Blog Posts
- Runtime App/API Security enables the most comprehensive and accurate API cataloging – a pivotal path to advanced cybersecurity posture
- How ThreatX Drives Success with the 3+1 Framework
- Going the Distance: How ThreatX Continues to Win in the Cybersecurity Marathon
- Welcoming Billy Norwood to the ThreatX Advisory Board
- ThreatX Protect: Automated Threat Protection
- Welcoming Dane Jones to Our Board of Advisors
- What is Runtime Security?
- Welcoming David McLeod to Our Board of Advisors
- Application Security Should be Revamped
- ThreatX Prevent: Vulnerability Identification & Remediation Workflows
- Unrestricted Access to Sensitive Business Flows
- What is a DDoS Attack, and How to Protect Against it?
- Proactive Measures in Light of CVE-2024-3094
- API and App Security: Q4 2023 Snapshot
- API Security: Purple Teaming Exercises
- API Security: Blue Teaming Exercises
- API Security: Red Teaming Exercises
- Cisco Acquires Isovalent, Creator of eBPF: Why It Matters
- How to Discover and Document Your API Landscape
- What are cybersecurity risks? Types and Solutions
- Q3 ThreatX Platform Data: Spotlight on the Banking Industry
- API and App Security: Q3 2023 Snapshot
- Unrestricted Resource Consumption: What It Is, How We Can Help
- Broken Object Property Level Authorization: What It Is, How We Can Help
- Addressing the HTTP/2 Rapid Reset Attack Vulnerability
- Two Most Common Brute Force Attacks We See
- Cybersecurity Awareness Month: Protecting Seniors in a Digital World
- ThreatX API and Application Protection at the Edge and at Runtime: Better Together
- Why Identifying Sensitive Data in APIs Is Critical for PCI DSS and GDPR Compliance
- How to Secure APIs – 10 Best Practices to Follow
- What are Zero Trust APIs?
- API Architecture – Best Practices for Building APIs
- Defending Against Zero-Day Threats
- ThreatX Teams With Highgate IT Solutions to Deliver Managed API and Application Protection to the UK Market
- New Whitepaper: All You Need to Know About Protecting Against Runtime Threats to APIs and Applications
- How eBPF Addresses the Challenges of Runtime Threats
- What is an API Attack and how to prevent them?
- API Security – Crafting an Effective Strategy
- Why Visibility Beyond HTTP Is Key to Securing APIs and Apps
- Takeaways From the Verizon 2023 Data Breach Investigations Report
- The Emergence of Solver Services
- ThreatX Blocks Millions of Credential Stuffing Attempts Targeting Pet Supply Company
- Bret Settle Appointed ThreatX Chief Product Officer
- Why Is Runtime API and Application Protection Important?
- How to Identify Distributed Botnet-Based Attacks
- 11 Picks for Web Application Firewall for WordPress
- What Security Misconfiguration Is, and How We Can Help
- How to Determine Noise vs. a Targeted Attack
- Making a Business Case for API Security: Talking Points for Speaking to the Board
- Credential Stuffing: Examples, Detection and Impact
- Detailed Look at a Real-World Credential Stuffing Event
- How Much Do You Care About Vendors’ Security?
- Takeaways From the New White House National Cybersecurity Strategy
- Why I Joined ThreatX
- The Evolving MyloBot Botnet
- How ThreatX Defends Against Multi-Vector API and Application Attacks
- OWASP API Security Top 10 2023 Security Risks
- Attackers, Take the Wheel: API Vulnerabilities Found in 16 Car Brands
- How ThreatX Is Protecting Organizations From Attacks, and From Working Weekends
- How to Combat Multi-Vector Attacks Against APIs and Web Apps
- Avoid This Common Phone Scam
- A Look at a Few Real-World Multi-Vector API & Web Application Attacks
- Announcing ThreatX Labs
- Did You Read Our Most Popular 2022 Blog Posts?
- What Is a Multi-Vector API Attack?
- What is Mass Assignment: How We Can Help
- Deconstructing API Attacks
- ThreatX Launches Robust Library of On-Demand Training
- The Best Way to Combat Bot-Based API Attacks
- Broken Function-Level Authorization: What It Is, How We Can Help
- Omnichannel Retail: Risks and Benefits
- OpenSSL Vulnerability
- Pro-Russian Hacker Group, Killnet, Attacking US Government Sites
- Inline Protection vs. Out of Band Analysis
- Lack of Resources and Rate Limiting: What It Is, How We Can Help
- Brute Force Attacks: What They Are, How They Work, How to Prevent Them
- Challenges of Stopping Bot-Based API Attacks
- HTTP Request Smuggling Vulnerability in Node.js
- The Types of API Attacks We Are Seeing
- A Look at Popular Botnets and How to Stop Them
- ThreatX Named in 2022 Magic Quadrant™ for Cloud Web App and API Protection for Second Consecutive Year
- Why Do You Need a WAF For Your Websites?
- An Introduction to API Protection
- How Attackers Are Using Bots to Breach APIs
- ThreatX Raises $30 Million in Series B Funding
- Excessive Data Exposure: What It Is, How We Can Help
- Discovering and Protecting GraphQL APIs
- Smarter Not Harder: 3 Ways API Analytics Can Help Application Owners
- Gene Fay Gives Keynote at 2022 Networking Technology Program Graduation
- Broken Authentication: What It Is, How We Can Help
- Open Banking Forcing Prioritization of API Protection
- How Not to Protect APIs From Attack
- How to Use API Schema to Improve API Protection
- Why the Long View Matters in API Attack Protection
- Addressing the Atlassian Confluence Vulnerability
- What is BOLA – Broken Object Level Authorization?
- Get API Protection Best Practices With “The Definitive Guide to API Attack Protection”
- PCI DSS 4.0: New Requirement to Automate Detection and Prevention of Web-Based Attacks
- Think Like an Attacker: How to Add Security Into API and App Development
- ThreatX SOC Vulnerability Alert: CVE-2022-21449 “Psychic Signatures”
- Announcing New ThreatX API Protection Capabilities
- Security XChange: John Brunn, CISO
- Demystifying API Security
- Spring4Shell: Day 1 Update and Insights
- ThreatX Response to Spring4Shell
- Five Requirements for Protecting APIs Against Attacks
- ThreatX Security XChange: Terence Runge, CISO
- API Protection vs. Security: Getting Started
- How Rogue and Zombie APIs Expand Your Attack Surface
- Response to Threat of Russian Cyberattacks
- New Research: How Does API Security Affect Consumers?
- Read the Fine Print: Can’t Block an API Attack? You Can’t Protect
- ThreatX Security XChange: Jeff Gardner, CISO
- How We Were Able to Help Our Customers With the Log4j 0Day
- Account Takeover (ATO): Types, Detection, Prevention and Protection
- ThreatX Starts Off Strong in 2022
- Digital Hygiene Tip From Our SOC: Update Your Cipher Suites and Certificates
- How ThreatX Can Help Address Cyber Insurance Critical Controls
- How to Simplify Your API to Narrow Attack Vectors
- Did You Read Our Most Popular 2021 Blog Posts?
- API Gateway Security – What kind of security do API gateways offer?
- Starting the New Year Strong With Our New CFO!
- ThreatX Named 2022 Best Place to Work
- Log4j2: What We’ve Seen, What We Expect
- Tips From the ThreatX SOC: Managing the Log4j Vulnerability
- Log4j Update: Threat to Local Hosts – ThreatX Response
- Detecting and Blocking Log4j2: ThreatX Retro
- Cyberattacks in 2022 Will Look Familiar
- Welcome Tom Axbey to the Board of Directors!
- Log4j2 Vulnerability Mitigation at ThreatX
- Grinch Bots Wreaking Havoc This Holiday Season
- Why Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
- How to Simplify WAF Rule Management
- Welcome to Our New CMO!
- Credential Stuffing, DDoS Attacks, Bots, and More Create a Formidable Iceberg of Risk
- Ransomware Prevention: Beyond Phishing Awareness
- How ThreatX Lowers False Positives, Delivers Visibility, and Speeds Time to Value
- Your Best First Step in Building an Application Security Program
- From Zombie to Rogue to Shadow APIs: How to Reduce API Security Risks
- On Running Marathons and Running a Tech Startup
- How to Overcome Credit Union Cybersecurity Challenges
- New Research: Bot and DDoS Attacks on the Rise
- ThreatX Named a Visionary in 2021 Gartner® Magic Quadrant™ for Web Application and API Protection
- Ready for a WAF Alternative? Your Peers Are Too
- A CISO, a VP of Engineering, and a Threat Hunter Walk Into a BBQ …
- Shift Left vs Shift Right Security Testing
- API Catalog Capabilities a Win for Our Customers
- Visibility into API Deployment
- Sustaining our Black Hat Momentum
- With Great APIs comes Great Responsibility
- Back in Black [Hat]!
- API Security Checklist: 5 Standards for Protecting APIs
- How to Stop and Prevent Credit Card Fraud
- If all you have is a hammer…
- One stop shop
- Winning the battle against blended threats
- 2020 Net Promoter Score (NPS) Improves
- Protect your Users from Friendly Fire in the War on Bots
- Credential Stuffing Prevention: How to stop and mitigate credential stuffing attacks
- DDOS attacks and the 2020 election
- Prune the Sprawl. Get Better AppSec.
- What Are Bad Bots, and How to Stop Them
- Five Reasons Agentless AppSec is the Right Choice
- Why it’s time to adopt a risk-based approach to appsec
- This Way to WAAP
- 3 Steps to Improve Your AppSec Using ThreatX and Splunk Phantom
- Making the Change to Risk-Based AppSec
- ThreatX Integrates with Cortex XSOAR by Palo Alto Networks
- You Wouldn’t Buy a Home Without an Inspection. Why Buy a Company Without One?
- Beware the WAF in WAAP Clothing
- My First 100 Days
- Meet PCI Requirements Consistently and Efficiently
- Joining the Front Lines of AppSec
- How to Cut Costs & Reduce AppSec Risk
- Eliminate AppSec Sprawl
- OWASP TOP 10: APIs Take Center Stage in Latest List of Priorities
- Fighting the AppSec Fight: Don’t sell products. Create partnerships.
- Embedded in the ThreatX SOC: My First 30 Days
- Better Security + More Efficient Ops with a Unified Approach to AppSec
- ThreatX at Black Hat 2019: Find Out How We Can Cut Through the Noise of Your Job…In More Ways Than One
- Detect & Prevent Newly Observed Malicious Automation Attacks
- Why Security Teams Need to Virtual Patch
- Top 4 Malicious Automation Attacks & How to Detect Them
- Detecting Advanced Bots Using Active Interrogation
- 2019 Application Security Priorities – Stats & Trends
- Flying Blind Into the Threat Visibility Gap
- Strengthen Your Web App Defenses Using Behavioral Analysis and Attacker Deception
- Top API Security Challenges and How to Address Them Today
- How and Why to Use APIs to Strengthen Your AppSec Strategy
- Web Application Firewalls 101 – Keywords to Bookmark
- Malicious Bot Detection Through A Complex Proxy Network
- Automation – Business Ally or Security Adversary?
- Attacks Against IoT Devices Through APIs & How to Prevent Them
- Best Practices for Automation in Cyber Security
- How to Best Protect Applications in the Cloud
- CIO Applications Names ThreatX In Top 25 Cyber Security Companies in 2019
- Beyond Basic WAF Coverage – New ThreatX Capabilities
- What is a Next-Gen WAF?
- Using a Next-Gen WAF to Identify & Prevent Carding
- API Vulnerability Lives at the Heart of the Breach
- Using Next-Gen WAFs to Solve Modern AppSec Problems
- Key Points for Building and Connecting Security-Friendly APIs
- Top 6 Questions Around API and Microservices Security, Answered
- How to Secure APIs & Microservices with a Next-Gen WAF
- A CISO’s Journey to Find a Web Application Firewall that Works
- Machine Learning in Cybersecurity – Demystifying Buzzwords & Getting to the Truth
- Using the Web App Kill Chain to Identify & Neutralize Threats
- How to Adequately Account for and Secure IoT Devices
- IoT Cloud Portals – A Modern Day Hacker’s Keys to the Kingdom
- Shifting DevOps Models and Their Impact on Application Security Tools and Strategies
- Top Cybersecurity Threats & How the WAF Must Evolve to Address Them
- 3 Hurdles Security Will Need to Clear to Succeed in a DevOps World
- Too Little Too Late: ThreatX Predicts Cyber Vulnerabilities Will Go Largely Unaddressed…with Dire Consequences
- ThreatX Recognized as a Finalist for Best Web Application Solution
- Facing the Apache Struts Vulnerability with Confidence Using ThreatX
- The Rise of the Attacker-Centric Web Application Firewall (WAF)
- Marriott’s Costly Mistake: Letting Compliance Trump Security
- The New Age of Applications and What it Means for Security
- Too Busy Tuning Your WAF to Realize You Don’t Have To?
- How to Adequately Account for and Secure IoT Devices
- Using the Web App Kill Chain to Identify & Neutralize Threats
- Tightly Coupling Applications and Security for Infinite Scale
- From White Hat Hacker to CTO – An Interview with ThreatX’s Andrew Useckas
- Using Android Proxy Browsers – Convenience without Web Application Security
- 5 Negative Impacts of Misaligned Security Strategies
- Meet ThreatX at Black Hat 2018
- X Marks the Spot: Knowing Where and When to Block Threats
- The Proliferation of Web Application Attacks – “Ain’t Nobody Got Time for That!”
- Using & Protecting Microservices – A Double-Edged Sword
- Top 7 Frequently Asked Cybersecurity Questions, Answered.
- How to Detect Botnet Traffic with Behavioral Analysis
- Unexpected Web Application Attacks: When Not to Trust Your Search Engine
- Hybrid Cloud Threat Detection
- Binary Decisions vs Active Interrogation
- Enhanced Edge Caching, Site Profiling, and Bot Capabilities
- You’re Only as Strong as the Weakest Link in Your Web App Fence