Search results: application programming interfaces

Application Programming Interfaces (APIs): The Soft Underbelly of Zero Trust

Application Programming Interfaces (APIs): The Soft Underbelly of Zero Trust

| | Public Sector
Zero Trust is a great framework to protect our IT assets, operations, and data.  It has gained a lot of attention and many followers since the idea was first introduced by John ...
How to Perform Pentesting for a Secured Web Application?

How to Perform Pentesting for a Secured Web Application?

| | Cyber Security, VAPT
According to Gartner, penetration testing will reach a $4.5 billion market by 2025 as a result of its increasing recognition. Failure to conduct routine web application penetration testing exposes vulnerabilities that adversaries ...
Application Security Fundamentals: Common Threats and How to Mitigate Them

Application Security Fundamentals: Common Threats and How to Mitigate Them

| | Application Security, pentesting
An application serves as a gateway for customers to interact with your products and services from anywhere with an internet connection. Consider your application like a secure locker where valuable... The post ...
Security Observability: Intelligent security assessment improves visibility into critical applications and APIs

Security Observability: Intelligent security assessment improves visibility into critical applications and APIs

Contrast Security’s 2023Cyber Bank Heists report showed that hackers and cybercrime cartels from Russia, North Korea and China have mastered the growing complexity of attack surfaces and are hiding behind that complexity ...

Countdown to GovWare 2023 – The Application of Artificial Intelligence (AI) in Cybersecurity

| | Blog, events
The stage is set, and the countdown has begun. GovWare 2023, a pivotal event in cybersecurity, is just around the corner. From a thorough review of the event agenda, we discerned that ...
Cloud with key inserted in the middle, a visual concept of cloud application security systems.

What is Cloud Application Security? A Complete Guide

| | Industry Insights
As cloud-based applications become an ever-present part of businesses across industries, security leaders struggle to ensure sensitive company, customer and employee data remains protected. The rise of remote and hybrid work further ...

How to Mitigate Threats to a Content Delivery Application

Learn the top 9 ways to stop cybersecurity threats to your content delivery application  A content delivery application is a software or system that efficiently distributes various digital content to end-users. Its ...
Thundra Logo

Remote Debugging for Java Applications

| | debugging
Introduction The shift to cloud computing and distributed systems has brought about many benefits, but it has also introduced new challenges when it comes to debugging. Traditional debugging methods such as logging ...
The Top 10 app-attack trends in the financial sector

Top 10 application attack trends in financial sector | Cyber Security in Financial Services | Contrast Security

As the financial sector digitally transforms, it is under siege, as data from Contrast’s platform and other reports clearly show ...
Defensics adds gRPC support for distributed web and mobile application security testing

Defensics adds gRPC support for distributed web and mobile application security testing

Learn how the gRPC test suite and gRPC wizard enable Defensics customers to create their own test sequences from protocol buffer definitions. The post Defensics adds gRPC support for distributed web and ...