Syndicated Blog

Blog ��� ThreatX

Digital Hygiene Tip From Our SOC: Update Your Cipher Suites and Certificates

It’s January, and most of us are hitting the gym, eating salads, and resolving to take better care of our health. This year, we’d encourage you to add “improve digital health.” We’re ...

How ThreatX Can Help Address Cyber Insurance Critical Controls

Our customers often ask us for help addressing the requirements of insurers. It’s clear that securing APIs and web apps is increasingly top of mind for insurers; our customers tell us that ...

More Simple = Less API Attack Vectors

The bottom line is that every feature of your API is a potential attack vector. Simplifying your API can reduce your attack surface area, in turn allowing you to better focus your ...

Did You Read Our Most Popular 2021 Blog Posts?

2021 was a big year for ThreatX. Not to brag, but we more than doubled our employees and customers, and made it on to the Gartner MQ! It also brought a lot ...
API Gateway Security – What kind of security do API gateways offer?

API Gateway Security – What kind of security do API gateways offer?

APIs are critical building blocks of modern applications and also represent one of the fastest-growing facets of an organization’s attack surface. Naturally, enterprises need to ensure that these assets are properly managed, ...

Starting the New Year Strong With Our New CFO!

| | People & Culture, SBN News
I am thrilled to introduce Libby Merrill, CPA, as our Chief Financial Officer and the newest member on our executive leadership team.  ThreatX storms into 2022 with significant business momentum, including dramatic ...

ThreatX Named 2022 Best Place to Work

| | People & Culture, SBN News
I am thrilled to share that ThreatX has been named to Built In’s 2022 Best Places to Work lists: Colorado Best Places to Work  Colorado Best Small Companies to Work For Colorado Best Paying ...
Credential Stuffing Examples and Keys to Detection

Credential Stuffing Examples and Keys to Detection

As part of our ongoing blog series on the modern threat landscape, we are taking a look at some of the many threats and risks that are often missed by legacy WAFs ...

Log4j2: What We’ve Seen, What We Expect

We’re about a week and a half into the release of the Log4j2 vulnerability, and to date we’ve seen both a lot of related malicious activity, and a lot of changes in exploits. In terms of activity level, we were actually surprised at ...

Tips From the ThreatX SOC: Managing the Log4j Vulnerability

The Log4j vulnerability has created a lot of chaos for security professionals. While there is no silver bullet to addressing these issues, there are important steps companies should take. Here’s where the ...