Zero trust security is the best answer to modern security threats. Learn how to adopt a zero trust security model in your applications and how Traceable AI can help.

Subscribe for expert insights to protect your applications.
Thanks! Your subscription has been recorded.
Zero trust security is the best answer to modern security threats. Learn how to adopt a zero trust security model in your applications and how Traceable AI can help.
It’s difficult to implement all the best practices for every possible attack vector, especially since new vulnerabilities are always being discovered. That doesn’t mean you shouldn’t try.
This post will walk you through how to create a next js serverless app from scratch. You’ll learn how to combine and use Next.js and MongoDB.
Shift left is not just about shifting your tools and process but the knowledge as well.
What are GraphQL Fragments? How can you take advantage if them to write cleaner code and more efficient applications? Find out here.
Agents-based gathering methods have evolved and matured to listen for and record deeper and wider to ascertain more data-driven insights and analysis.
To stay relevant as a cybersecurity professional, you need to understand the microservices and what are the changes in architectures and APIs and how they can be attacked.
In this post, we’ll look at API latency including how you measure it, the difference between API response time and API latency, and more.
In this article, we’ll discuss the benefits of serverless architectures and go through some of the best practices for deploying serverless applications.
Thinking about how to secure microservices? In this article you’ll find 6 things you can’t forget when it comes to microservices security.
Serverless vs containers: Which one is right for your application? Learn more about these two main approaches to deploying applications.
This post explains what a CRUD API is and how to apply it to different use cases to protect and interact with data in very specific ways.
I am grateful that I was entrusted with a role, which helped me grow as a designer.
In this post we learn about monolithic vs microservices architectures and understand which to use and when.
We now have advanced tools that can make threat hunting easier and more accessible. In this post, learn about 5 threat hunting tools for API security.
Learn what DDoS is and what it can do to your API endpoints, how to mitigate DDOS attacks, and build a security response.
GraphQL offers a much more efficient, powerful alternative to REST
When you build application software and APIs, you’ll often hear about “business logic.” In this post you’ll learn everything about it.
Learn about Network Traffic Analysis, its importance and different strengths and weaknesses.
The world of API compliance is more important than ever today. In this post, dig deeper into API compliance and its importance.
API security is a fundamental part of web applications. It is a great tool to help protect your apps, your business, and your users.
Your API should be accessible and flexible. Read this to learn how to make an API that follows API architecture and design guidelines.
API governance involves sticking to a set of principles when building an API. It’s crucial since apps, organizations, and data sources will use the API.
It’s very important that we think about how not to expose sensitive data, and that’s what this article is about: Sensitive Data Exposure.
A guide about API ownership for leadership, senior engineers, security experts, and product managers to make/work better together.
Every week, new API vulnerabilities are open to attackers. API security is essential, especially for those who depend on them.
In this post, you’ll learn about the most important microservices security principles and some best practices.
By the end of the post, you’ll understand what mass assignment is and how it leads to a vulnerability. We’ll also look at some examples and understand its impact on business.
A discussion on how a cloud-based home-brokerage-enabler, Houwzer, constructed a resilient API-based platform as the heart of its services integration engine.
Explore how API-intensive and API-experienced businesses are bringing maturity to their APIs’ protections through greater observability, tracing, and usage analysis.
A discussion with Traceable AI CEO and co-founder Jyoti Bansal on how APIs, microservices, and cloud-native computing form a new frontier for cybersecurity vulnerabilities -- as well as opportunities for innovative defenses and resilience.
A discussion with Traceable AI CEO and co-founder Jyoti Bansal on the latest innovations for making APIs more understood, trusted, and robust.
A discussion with Adrian Ludwig, CISO at Atlassian, on creating broader awareness of security risks and building a security-minded culture across organizations and ecosystems.
A discussion with Ravi Guntur, Head of Machine Learning and Artificial Intelligence at Traceable, on the best security solutions for APIs across their dynamic and often uncharted use across myriad apps and business services.
A discussion with Traceable AI CTO and co-founder Sanjay Nagaraj on a new platform designed from the ground up to define, manage, secure, and optimize the API underpinnings for so much of what drives today’s digital business.
A discussion on an open-source project, Hypertrace, and how it helps designers, builders, and testers of modern APIs gain visibility across their internal and third-party services.
A discussion with Greg Phillips, Chief Technology Officer (CTO) at Houwzer, on how a cloud-based home-brokerage-enabler, Houwzer, constructed a resilient API-based platform as the heart of its services integration engine.