Are custom security tests a product security superpower? ⎜Keshav Malik (LinkedIn)

Are custom security tests a product security superpower? ⎜Keshav Malik (LinkedIn)

Learn from our interview with Keshav how to better write your custom security tests and why they're necessary for your Product Security Program ...
How to Address API Sprawl: The Challenges and Opportunities of API Governance

The challenges and opportunities of API governance

Learn more about the concept of API sprawl, its implications, and the challenges and importance of API governance ...

What Are iframe Injection Attacks and How Do They Work?

| | API security
Imagine your financial institution sends you an email that says you need to check something related to your account and the email contains a handy link to help you resolve the issue ...
Top 3 API Leaks Identified by Cybersecurity & InfoSec Experts

Top 3 API Leaks Identified by Cybersecurity & InfoSec Experts

| | API security
APIs (Application Programming Interfaces) have proliferated widely, which increases their susceptibility to various vulnerabilities. In the realm of web applications, prime examples that stand out are SOAP (Simple Object Access Protocol) and ...
process automation Palo Alto Networks developer security AI felony mdr cybersecurity

Salt Security Applies Generative AI to API Security

Salt Security claims Pepper can decrease the time it takes to surface actionable security-related information by as much as 91% ...
Security Boulevard

What is API Security Testing?

| | API security, owasp
In short, API security testing involves the systematic assessment of APIs to identify vulnerabilities, coding errors, and other weaknesses that could be exploited by malicious actors. Application Programming Interfaces, or APIs, provide ...

Comprehensive Application and API Protection with Cequence and Vercara

In January of this year, Cequence announced our partnership with Vercara, a leading provider of cloud-based security services. The partnership was motivated in no small part by the fact that Web Application ...
 71% Website Vulnerable: API Security Becomes Prime Target for Hackers

 71% Website Vulnerable: API Security Becomes Prime Target for Hackers

The internet that we use today is a massive network of interconnected devices and services. Application Programming Interfaces (APIs) are an essential but sometimes invisible technology layer that underpins services ranging from ...
Cybersecurity Insights with Contrast CISO David Lindner | 3/29/24

Cybersecurity Insights with Contrast CISO David Lindner | 3/29/24

Insight #1 According to Google, zero days being exploited in the wild jumped 50% last year. I just don't understand your thought process if you are not looking at control layers like ...

Cequence Named to the Citizens JMP Cyber 66 List

Citizens JMP, a prestigious investment firm specializing in technology sectors, recently honored Cequence by recognizing us as one of the hottest privately held cybersecurity companies as part of its Cyber 66 list ...