Credential Stuffing Attacks - proxy solutions

Credential Stuffing Attack & Residential Proxy Bulletin Lacking in Detail

The FBI is warning security professionals to be on the lookout for increased use of residential proxies to execute a credential stuffing attack. The warning is a combination of good news and bad news. The Good News: Data Shows Elevated Residential Proxy Awareness The warning raises awareness around the use ... Read More
Fake Account Creation

What are Fake Accounts and How Can they be Worth $44 Billion?

Fake accounts have been around for years. They are commonly used to anonymously request info, avoid spam from an online merchant or participate anonymously in a conversation. Initially, fake accounts were easy to create manually, but over time the process became automated. More recently, fake accounts (aka bot or spam ... Read More
Fake Account Creation

What are Fake Accounts and How Can they be Worth $44 Billion?

Fake accounts have been around for years. They are commonly used to anonymously request info, avoid spam from an online merchant or participate anonymously in a conversation. Initially, fake accounts were easy to create manually, but over time the process became automated. More recently, fake accounts (aka bot or spam ... Read More
API usage

New Research Confirms Need for End-to-End API Security

Up until just a few years ago, web applications were the dominant platform for all things digital and APIs were tools used to address development corner cases. Driven by mobile device ubiquity, the adoption of the cloud, and the move towards agile, more iterative microservices-based development methodologies, APIs are now ... Read More
API usage

New Research Confirms Need for End-to-End API Security

Up until just a few years ago, web applications were the dominant platform for all things digital and APIs were tools used to address development corner cases. Driven by mobile device ubiquity, the adoption of the cloud, and the move towards agile, more iterative microservices-based development methodologies, APIs are now ... Read More

What is OpenAPI and how does it affect API security?

When it comes to application development via APIs, there are a few questions that can determine both the quality of the resulting code and the security posture of the applications in production. One such question: Does your organization use a common API specification framework to track its development? Documentation via ... Read More

What is OpenAPI and how does it affect API security?

When it comes to application development via APIs, there are a few questions that can determine both the quality of the resulting code and the security posture of the applications in production. One such question: Does your organization use a common API specification framework to track its development? Documentation via ... Read More

Using an API Security Checklist: What Should You Look For?

When asked how to define API security, most security professionals would say it means protecting your APIs. Asking a second, more specific question of what are the API security solution requirements needed to address the explosive use of APIs and the corresponding increase in malicious activity will result in a ... Read More

Using an API Security Checklist: What Should You Look For?

What is the true definition of API security? This is an important question for IT security leaders to ponder, because of the explosion in API usage in recent years, but if you ask 10 tech stakeholders, you’ll receive 10 different answers. No matter the size of your organization’s technology footprint ... Read More
API Sentinel 2.0 Overview

Why do I Need API Security if I Have a WAF and API Gateway?

| | About Cequence, api gateway, waf
The web and mobile applications that your employees and customers use are glued together by application programming interfaces (APIs). The collaboration app on your phone “talks” to your collaboration system via APIs, allowing you to see who is online and message them. Your productivity, marketing automation, CRM, and project tracking ... Read More