Blog: Why Hackers Love Phones - Keep your Eye on the Device

Blog: Why Hackers Love Phones – Keep your Eye on the Device

This is the third article in a guest blog series from Intellyx. Catch up on the first article here and the second one here. Maintaining a corporate cybersecurity posture means locking down its ...
“Mobile First” is for Mobile Secrets, Too

“Mobile First” is for Mobile Secrets, Too

This is the second article in a guest blog series from Intellyx. You can read the first article here. Organizations, such as the Citi Consumer Bank when I was head of security ...
Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

This is the first article in a guest blog series by Jason Bloomberg, Managing Partner, Intellyx Focusing on user authentication, including multi-factor authentication, is not enough to put mobile at the center of ...
Zero-Trust Alone Proves Inadequate for Securing APIs

Zero-Trust Alone Proves Inadequate for Securing APIs

The disclosure of three significant API security incidents in the first two months of 2023 serves as a reminder that, as the use of APIs continue to rise, so too does the ...
ChatGPT and API Security

ChatGPT and API Security

First of all, this blog was written by a human being! Now that that's out of the way,  let's get onto our main topic for today which is to take a look ...
How to Prevent API Abuse on Mobile Apps

How to Prevent API Abuse on Mobile Apps

API abuse is a growing concern in today's digital landscape, with criminals finding new and innovative ways to exploit APIs for their own gain. According to a recent study by Salt Security, ...
Can I Share My API Key?

Can I Share My API Key?

An API key is a token provided by a client when making API calls. It is used to authenticate and authorize access to specific resources. In this article, we answer the question, ...
What is Bot Protection?

What is Bot Protection?

If you're a mobile app developer, chances are you've heard of bot protection. Bots are programs that run automated tasks over the internet. Although criminals can use them for malicious purposes, such ...
What is a Bot Manager?

What is a Bot Manager?

In the world of mobile app development, it's essential to be aware of the latest security threats. Unfortunately, bot attacks are among the most common and dangerous security threats. For example, the ...
Why Should You Keep Your API Key Secure?

Why Should You Keep Your API Key Secure?

Attacks against APIs are increasing and API key protection is central to miminizing your business risks. In this article we’ll look at what your exposures are and what you should do about ...