March | Traceable AI Feature Release

March | Traceable AI Feature Release

Stay current with new developments from Traceable AI; including, local hosting for EU/Asia and support for agentless deployments. The post March | Traceable AI Feature Release appeared first on Traceable App & ...
Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework

Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework

| | app-security, Blog
Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework The post Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework appeared first on Traceable App & ...
February | Traceable AI Feature Release

February | Traceable AI Feature Release

Stay current with new developments from Traceable AI; including, new support for AWS Lambda serverless architecture and new privacy features for managing sensitive data. The post February | Traceable AI Feature Release ...
How Do Mass Assignment Vulnerabilities Impact My Business?

How Do Mass Assignment Vulnerabilities Impact My Business?

By the end of the post, you'll understand what mass assignment is and how it leads to a vulnerability. We'll also look at some examples and understand its impact on business. The ...
Daemonset Mirroring

January Software Release – Kicking off the New Year

It’s January and we kicking off the new year with a new set of features aimed at improving application security for our customers. Traceable AI has released a range of new features ...
Observability, AI And Context: Protecting APIs From Today’s (And Tomorrow’s) Attacks

Observability, AI And Context: Protecting APIs From Today’s (And Tomorrow’s) Attacks

Security and IT teams need to tackle this problem in a structured process that takes into account API application security best practices and procedures that constantly evaluate an organization's APIs. The post Observability, ...
Instant Log4j protection. Shield and hunt with Traceable AI

Instant Log4j protection. Shield and hunt with Traceable AI

| | API security, app-security, Blog
A look at the challenges teams face with mitigating Log4j vulnerabilities (i.e. Log4Shell) and how Traceable AI closes those gaps. The post Instant Log4j protection. Shield and hunt with Traceable AI appeared ...
scan and block Log4j use at runtime

Instant Log4j protection. Shield and hunt with Traceable AI

| | API security, app-security, Blog
A look at the challenges teams face with mitigating Log4j vulnerabilities (i.e. Log4Shell) and how Traceable AI closes those gaps. The post Instant Log4j protection. Shield and hunt with Traceable AI appeared ...
Traceable AI Can Help Detect and Protect Against Log4Shell, the Log4j RCE Zero-day Vulnerability (CVE-2021-44228)

Traceable AI Can Help Detect and Protect Against Log4Shell, the Log4j RCE Zero-day Vulnerability (CVE-2021-44228)

| | API security, app-security, Blog
The new Log4Shell zero-day vulnerability has got the Internet at arms. There are active exploits and scanning for the vulnerability is rampant. The vulnerability is widespread and will take time to resolve ...

How to take a layered approach to API security

A popular fairy tale told in IT circles is that the internet is built on a perfectly orchestrated 7-layer stack. A popular extension of this notion is that enterprises can secure their ...

Secure Guardrails