March | Traceable AI Feature Release
Stay current with new developments from Traceable AI; including, local hosting for EU/Asia and support for agentless deployments. The post March | Traceable AI Feature Release appeared first on Traceable App & ...
Shadow APIs require a search light of discovery
Organizations must understand all the APIs in their ecosystems, as well as the specific risks associated with each of them to both detect and protect against attacks. The post Shadow APIs require ...
Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework
Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework The post Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework appeared first on Traceable App & ...
APISecure: The First API Security Conference Makes Its Debut on the World Stage
Cyberspace is the ultimate equalizer where it doesn’t matter how much money or resources a company has, everyone is equally vulnerable to a breach. The post APISecure: The First API Security Conference ...
How to Secure Microservices: The 6 Things You Can’t Forget
Thinking about how to secure microservices? In this article you'll find 6 things you can't forget when it comes to microservices security. The post How to Secure Microservices: The 6 Things You ...
Serverless vs Containers: What’s Right for Your Application?
Serverless vs containers: Which one is right for your application? Learn more about these two main approaches to deploying applications. The post Serverless vs Containers: What’s Right for Your Application? appeared first ...
What is a CRUD API?
This post explains what a CRUD API is and how to apply it to different use cases to protect and interact with data in very specific ways. The post What is a ...
My Design Internship at Traceable.ai
I am grateful that I was entrusted with a role, which helped me grow as a designer. The post My Design Internship at Traceable.ai appeared first on Traceable App & API Security ...
Monolithic vs. Microservices Architecture: Which Should I Use?
In this post we learn about monolithic vs microservices architectures and understand which to use and when. The post Monolithic vs. Microservices Architecture: Which Should I Use? appeared first on Traceable App ...
5 Best Threat Hunting Tools for Your Security Team
We now have advanced tools that can make threat hunting easier and more accessible. In this post, learn about 5 threat hunting tools for API security. The post 5 Best Threat Hunting ...