One Stop Shop

One stop shop

One of my favorite activities as CEO of ThreatX is participating in meetings with prospects that have a legacy WAF already installed. In most cases, these discussions involve learning about a legacy ...
Credential Stuffing Blend Hammer-nails

If all you have is a hammer…

...Everything looks like a nail. There are over a five billion unique user credentials currently circulating on darknet forums. No wonder credential stuffing/brute force attacks are on the rise and remain one ...
PruneSprawl

Prune the Sprawl. Get Better AppSec.

“We are all just prisoners here of our own device.” --The Eagles   “Help me get rid of some of this stuff, or I’m gonna f’n lose it.”--Anonymous CISO  I’m going to go out on a very sturdy ...
BotBlogGene

The Many Faces of Bad Bots

Bad bots and malicious automation are one of the few technology challenges that can materially impact on every business team inside an organization. With up to 50% of Internet traffic generated by bots, ...
5 Reasons Agentless-1

Five Reasons Agentless AppSec is the Right Choice

I’m a big fan of the ThreatX agentless architecture. It simplifies many of aspects of deployment and side-steps a lot of the problems with agent-based architecture ...
PaloAlto XSOAR+TX social image

ThreatX Integrates with Cortex XSOAR by Palo Alto Networks

Today I am proud to announce the integration of the ThreatX WAAP with the Palo Alto Networks XSOAR platform. You can read the official announcement for more details here. This integration is ...

Fighting the AppSec Fight: Don’t sell products. Create partnerships.

It’s been a few weeks since we closed the book on another RSA conference. And as always, it was nice to catch up with old friends, meet new ones, and talk to ...

OWASP TOP 10: APIs Take Center Stage in Latest List of Priorities

OWASP recently released the first iteration of the API Security Top 10. Like the ubiquitous OWASP Top 10, the API Security Top 10 delivers a prioritized list of the most critical application ...

Better Security + More Efficient Ops with a Unified Approach to AppSec

As the demands of both modern applications and complex threat landscapes have continued to increase, many organizations have been forced to adopt an ever-growing list of new, specialized security tools in an ...