The inside trace. Subscribe for expert insights on application security. Thanks! Your subscription has been recorded. FEATUREDTraceable Tackles Deeper Data Protection Use Cases with Latest API Security Platform UpdateAPI SecuritycompanyReleases FEATUREDeBPF and API Security with TraceableeBPF promises to radically advance what our infrastructure, application, and security tools will be able to do. Here’s some background on what eBPF is, how it works, and why Traceable is the leading API Security solution working with eBPF.API Securitytechnology FEATUREDRSA 2022 Conference Recap: API Security, Cloud Security and Consolidation Were Top ThemesThis year’s RSA Conference was the first time that API Security became a primary focus. API Security FEATUREDOWASP crAPI: Introducing API Security the Hacker WayShift left is not just about shifting your tools and process but the knowledge as well.API Security 8.9.2022 Traceable Tackles Deeper Data Protection Use Cases with Latest API Security Platform Update Today, we are excited to announce enhanced data protection capabilities in our API Security platform component, API Protection! This update focuses on providing proactive protection against deeper and broader API abuse attempts that lead to fraud, and the compromising of sensitive data. APIs are the interconnectivity pipe through which data flows between applications, and to […] API SecuritycompanyReleases 7.15.2022 eBPF and API Security with Traceable eBPF promises to radically advance what our infrastructure, application, and security tools will be able to do. Here’s some background on what eBPF is, how it works, and why Traceable is the leading API Security solution working with eBPF. API Securitytechnology 7.1.2022 How to Implement Zero Trust Security in your Applications: A Tutorial Zero trust security is the best answer to modern security threats. Learn how to adopt a zero trust security model in your applications and how Traceable AI can help. API Security 6.30.2022 API Breaches: What Should I Know and How Can I Prevent Them? It’s difficult to implement all the best practices for every possible attack vector, especially since new vulnerabilities are always being discovered. That doesn’t mean you shouldn’t try. API Security 6.23.2022 How to Create Your First Next.js Serverless App This post will walk you through how to create a next js serverless app from scratch. You’ll learn how to combine and use Next.js and MongoDB. API Security 6.16.2022 Anatomy of an API Attack: Applying the MITRE Knowledge Base to API Threat Modeling MITRE takes a step back and looks at the behavior of an attacker instead of just a specific signature or IP address. It looks from the attacker perspective and discerns the behavior. API Security 6.13.2022 RSA 2022 Conference Recap: API Security, Cloud Security and Consolidation Were Top Themes This year’s RSA Conference was the first time that API Security became a primary focus. API Security 6.6.2022 OWASP crAPI: Introducing API Security the Hacker Way Shift left is not just about shifting your tools and process but the knowledge as well. API Security 5.28.2022 Traceable Launches Enhanced API Catalog — the industry’s only solution for API discovery, risk posture management, and compliance Today, we are excited to announce the new functionalities of API Catalog, Traceable’s API discovery and risk posture management solution! We have witnessed, first hand, a new shift within the software development industry, one that hasn’t been addressed fully by the API security tools available today. Cloud-native, distributed, and API-based applications create new risks for […] API SecuritycompanyReleases 5.11.2022 GraphQL Fragments: How to Simplify Your API Definitions What are GraphQL Fragments? How can you take advantage if them to write cleaner code and more efficient applications? Find out here. API Security search AI/MLAPI Securityapp securitybreach analysiscloud-nativecompanyDeveloperfoundationsObservabilityReleasestechnology reset