Can Behavioral Analytics Help Secure APIs?

Can Behavioral Analytics Help Secure APIs?

A security team intending to enhance API security might start with a traditional tool set such as: ... Read More
What Does XDR Have to Do With API Security?

What Does XDR Have to Do With API Security?

A growing number of organizations understand the critical role that some form of API security plays in their overall security and compliance posture. But for many, understanding where API security technology investments fit in with their broader security stack can be challenging ... Read More
Is Continuous Discovery Needed to Detect Rogue APIs?

Is Continuous Discovery Needed to Detect Rogue APIs?

A smart and scalable API security strategy has many factors. But even the most sophisticated API security approach needs a full and current API inventory. This might not sound difficult, particularly with mature API processes, governance, and documentation. But as with most aspects of security, planning for the unexpected is ... Read More
API security in the cloud isn’t optional

API security in the cloud isn’t optional

The conventional wisdom used to be that moving critical IT and security functions to the cloud introduced risk. After all, sending sensitive data beyond your company’s walls felt like you were putting your security in a stranger’s hands ... Read More
API Security: Real-Time Blocking or Detection and Response?

API Security: Real-Time Blocking or Detection and Response?

The API threat landscape is evolving rapidly. New uses of APIs are emerging. Transaction volumes are ever-increasing. And of course, threat actors are always finding new ways to outsmart even sophisticated API security measures. This is forcing the teams charged with protecting APIs to make strategic trade-offs between two competing ... Read More
API Security: Real-Time Blocking or Detection and Response?

API Security: Real-Time Blocking or Detection and Response?

The API threat landscape is evolving rapidly. New uses of APIs are emerging. Transaction volumes are ever-increasing. And of course, threat actors are always finding new ways to outsmart even sophisticated API security measures. This is forcing the teams charged with protecting APIs to make strategic trade-offs between two competing ... Read More
Granular Security at the App Level

Granular Security at the App Level

| | encryption
My last blog about Vormetric Application Encryption covered new RESTful APIs and it revealed that those APIs provide quite a... The post Granular Security at the App Level appeared first on Data Security Blog | Thales eSecurity ... Read More
Understanding keys is key to understanding

Understanding keys is key to understanding

The newest CipherTrust Cloud Key Manager capability CipherTrust Cloud Key Manager is a multi-cloud encryption key management solution ideal for... The post Understanding keys is key to understanding appeared first on Data Security Blog | Thales eSecurity ... Read More
Secure Cloud Migration and the Cloud Security Alliance

Secure Cloud Migration and the Cloud Security Alliance

| | Data Security
For many years, Thales eSecurity has been a solution provider member of the Cloud Security Alliance (CSA), a global organization... The post Secure Cloud Migration and the Cloud Security Alliance appeared first on Data Security Blog | Thales e-Security ... Read More
A RESTful API Delivers Flexibility for Vormetric Application Encryption

A RESTful API Delivers Flexibility for Vormetric Application Encryption

| | Data Security
Security Application Key Management One of the long standing challenges with security applications that involve data encryption has been key... The post A RESTful API Delivers Flexibility for Vormetric Application Encryption appeared first on Data Security Blog | Thales e-Security ... Read More