fbpx

John Jeremiah

Subscribe for expert insights to protect your applications.

Thanks! Your subscription has been recorded.

Log4Shell / Log4J Vulnerability Quick Start Guide

Log4Shell / Log4J Vulnerability Quick Start Guide

Log4Shell is one of the most impactful vulnerabilities we have seen in recent times. Traceable AI provides quick and complete protection for your applications from being exploited by Log4Shell.

Bigger Organizations Have Multiple Attack Surfaces

Bigger Organizations Have Multiple Attack Surfaces

Nowadays, protecting within the organization is table stakes, and we have to go beyond the four walls, we have to go and make sure that not only do we protect our organization, we also have to consider the ecosystem of our partners, the supply chain consisting of other third parties. These third parties and multiple stakeholders are going to interact with our systems, and we are going to interact with their systems using APIs. So, when we start interacting with APIs, cloud and SaaS models, the overall system is no longer within four walls or defined boundaries.

From Containers to APIs – A new perspective on Log4Shell

From Containers to APIs – A new perspective on Log4Shell

There is no fixed perimeter in the cloud, as microservices and applications connect through APIs. In the cloud, containers are created and destroyed depending on business demand, your infrastructure isn’t permanent, rather it’s ephemeral. Learn how to approach security in cloud native and containers.

API Hacking 101

API Hacking 101

The basics of API hacking including what they are, the API security top 10, how you can test for vulnerabilities in your APIs.

Hacking APIs

Hacking APIs

Hacking APIs is a crash course on web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.