Syndicated Blog

March | Traceable AI Feature Release

March | Traceable AI Feature Release

Stay current with new developments from Traceable AI; including, local hosting for EU/Asia and support for agentless deployments. The post March | Traceable AI Feature Release appeared first on Traceable App & ...
Shadow APIs require a search light of discovery

Shadow APIs require a search light of discovery

| | API security, Blog
Organizations must understand all the APIs in their ecosystems, as well as the specific risks associated with each of them to both detect and protect against attacks. The post Shadow APIs require ...
Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework

Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework

| | app-security, Blog
Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework The post Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework appeared first on Traceable App & ...
Official Trailer: Law Enforcement Vehicle Hack

APISecure: The First API Security Conference Makes Its Debut on the World Stage

Cyberspace is the ultimate equalizer where it doesn’t matter how much money or resources a company has, everyone is equally vulnerable to a breach.  The post APISecure: The First API Security Conference ...
A picture containing security cameras

How to Secure Microservices: The 6 Things You Can’t Forget

| | API security, Blog
Thinking about how to secure microservices? In this article you'll find 6 things you can't forget when it comes to microservices security. The post How to Secure Microservices: The 6 Things You ...
Container-based applications

Serverless vs Containers: What’s Right for Your Application?

| | API security, Blog
Serverless vs containers: Which one is right for your application? Learn more about these two main approaches to deploying applications. The post Serverless vs Containers: What’s Right for Your Application? appeared first ...
What is a CRUD API?

What is a CRUD API?

| | API security, Blog
This post explains what a CRUD API is and how to apply it to different use cases to protect and interact with data in very specific ways. The post What is a ...
product design photo

My Design Internship at Traceable.ai

| | Blog, company, Product
I am grateful that I was entrusted with a role, which helped me grow as a designer. The post My Design Internship at Traceable.ai appeared first on Traceable App & API Security ...
monolithic architecture diagram

Monolithic vs. Microservices Architecture: Which Should I Use?

| | AI/ML, API security, Blog
In this post we learn about monolithic vs microservices architectures and understand which to use and when. The post Monolithic vs. Microservices Architecture: Which Should I Use? appeared first on Traceable App ...
Graphical user interface, text, application  Description automatically generated

5 Best Threat Hunting Tools for Your Security Team

| | API security, Blog
We now have advanced tools that can make threat hunting easier and more accessible. In this post, learn about 5 threat hunting tools for API security. The post 5 Best Threat Hunting ...