Web, Application & Hybrid Cloud Security

Flying Blind Into the Threat Visibility Gap

Data, data everywhere and yet there’s very little insight to inform the business on the true nature and severity of…

2 years ago

How and Why to Use APIs to Strengthen Your AppSec Strategy

APIs are at the heart of modern applications and have quickly become a favorite target of attackers. And for good…

2 years ago

Strengthen Your Web App Defenses Using Behavioral Analysis and Attacker Deception

For many enterprises today, Web and cloud applications are critical components of the business. And for the ever-increasing number of…

2 years ago

Top API Security Challenges and How to Address Them Today

APIs have altered the attack surface of modern applications and exposed new gaps in security in the process. In the…

2 years ago

Web Application Firewalls 101 – Keywords to Bookmark

Web security is not a new concept. From the dawn of the Internet, cyber criminals have been experimenting with and…

2 years ago

Automation – Business Ally and Security Adversary?

In a world where speed and agility is expected by consumers and required for business operations, automation has become key component…

2 years ago

Attacks Against IoT Devices Through APIs & How to Prevent Them

You would never leave the keys to your building lying around, so why do so many organizations leave the keys to…

2 years ago

Best Practices for Automation in Cyber Security

Automation has become a central component to growing and successful businesses. This holds true in the cybersecurity sector as well,…

2 years ago

What’s So “Next-Gen” About the Next-Gen WAF?

The term “next-generation” gets thrown around a lot in security. Marketers have overused the term to the point that, for…

2 years ago

API Security Lives at the Heart of the Breach

*We are thrilled to introduce and feature David Geer on the ThreatX Blog. David is a content marketing writer and market…

2 years ago