3 Recommendations to Ensure Your API Security Solution can Drive Data Visibility and Quality

Today at least 90% of developers are using APIs in cloud-native web application development. According to new data collected by Forrester Research and presented in their report, Improve API Performance with a ...
security pentesting ThreatX red team pentesting API APIs Penetration Testing

API Security and Cloud: What you Need to Know

The internet is much like a shopping mall—intended to be open. And because it is designed to be open to the public, there’s little to stop anyone from entering. Security guards and ...
Security Boulevard
API security rise GitOps Finite State API APIs tokenization

The Rise of APIs and Risks of API Security

Some strange phrases have become cultural touchstones: “Hey, Siri,” “Hey, Alexa,” and “Hey, Google.” If you’ve ever uttered any of these phrases to ask for directions, play a song or find out ...
Security Boulevard
API Security Activity Summary Key Findings

State of API Security Activity

A recap of API threat statistics and unique threat patterns observed by the Cequence CQ Prime Threat Research Team. Summary of Key Findings Unusual uptick in traffic from China spiking at a ...

Using an API Security Checklist: What Should You Look For?

What is the true definition of API security? This is an important question for IT security leaders to ponder, because of the explosion in API usage in recent years, but if you ...
What Are the Most Common Types of Mobile Man-in-the-Middle Attacks?

What Are the Most Common Types of Mobile Man-in-the-Middle Attacks?

A Man-in-the-Middle attack can come in multiple forms. This article describes these and how you can mitigate such attacks ...
Evasive Bots Drive Online Fraud – 2022 Imperva Bad Bot Report

Evasive Bots Drive Online Fraud – 2022 Imperva Bad Bot Report

The 2022 Imperva Bad Bot Report is now available. The report is the ninth annual in-depth analysis of bot traffic, created with data collected from Imperva’s global network throughout the past year ...
What Does Certificate Pinning Protect Against?

What Does Certificate Pinning Protect Against?

Certificate pinning is a security measure that mobile app developers can use to improve the security of their apps. It ensures that your app only connects with a backend API via TLS ...
How is Certificate Pinning Done?

How is Certificate Pinning Done?

Certificate Pinning is a security technique that involves binding a cryptographic certificate to a specific host or domain. This ensures that the app and server communications are protected from man-in-the-middle attacks. Developers ...

Three new API exploits causes GitLab data privacy and availability issues

On May 10, 2022, and May 11, 2022, CVE-2022-1352 CVE-2021-1431, and CVE-2022-1545 were fixed and published on Gitlab-ORG public repository. There are no technical details or exploits yet, but according to the ...