We are very excited to announce Traceable’s latest integration with Google Cloud application load balancers to provide agentless API security in Google Cloud. At Google Cloud Next ’23, Traceable partnered with the Service Extensions team and now with the release of service extension’s public preview, Traceable customers can seamlessly integrate with Google Cloud’s application load balancers to secure all API traffic passing through them.
cloud-native
Subscribe for expert insights to protect your APIs.
Thanks! Your subscription has been recorded.
Shadow APIs: The New Form of Shadow IT
Shadow APIs: The New Form of Shadow IT and What You Can Do About It While many security professionals are more than familiar with the term “Shadow IT”, Shadow APIs are just starting to become a known phenomenon. And of course they’re becoming a big deal. Most...
The HackerOne 2022 Report: Analysis and Insight on Modern Day Vulnerabilities
About the 2022 HackerOne Security Report HackerOne released its 6th annual Hacker-Powered Security Report. The Company has been surveying ethical hackers to get their perspective on cybersecurity and risk. The 2022 Hacker-Powered Security Report includes insights from...
Top Data Breaches of 2022 and What they Mean for API Security
Top Data Breaches of 2022 and What they Mean for API Security 2022 was quite a year for data breaches. Isn’t that always the story? Each year, the data breaches become worse, resulting in higher costs, brand value erosion, and effectively propel so many security...
How Jobvite Eliminated API Sprawl with Traceable’s API Security Platform
How Jobvite Eliminated API Sprawl with Traceable’s API Security Platform The rise of distributed applications and microservices has created a new attack surface. One which is not fully understood by many security professionals or addressed by existing solutions in the...
Defense in Depth: A Guide to Layered Security
This article will go over how defense in depth and layered security work as well as the benefits of using them.
A Guide to Modernizing Legacy Applications
In today’s post, we’ll guide you through the modernization of your legacy application and determine if it’s something you should implement.
How to Plan Your Cloud Security Architecture
In this post, you’ll learn some essential tips and tricks about planning your cloud security architecture.
NextRoll Gains 8x Visibility into APIs and Solves API Sprawl
NextRoll Gains 8x Visibility into APIs and Solves API Sprawl It's time for another customer story from Traceable! Today's blog highlights NextRoll's journey to API Security, and specifically their struggle with API Sprawl and gaining visibility into all APIs. Let's...
Sensitive Data Leakage: Defined and Explained
Sensitive Data Leakage: Defined and Explained We live in a digital world where everything happens on the internet, from filling out important financial forms to online shopping. All such activities require you to fill in some sensitive data via the internet. As more...
Black Friday Cybersecurity: Top 5 Insights from Traceable Chief Security Officer
Black Friday Cybersecurity: Insights from Traceable Chief Security Officer, Richard Bird. It's that time again -- the season of Black Friday and Cyber Monday, and all the cybersecurity trimmings that come along with them. This time of year, retail and e-commerce shops...
A Leader’s Guide to Understanding and Preventing Bot Attacks
Many business leaders remain in the dark about the dangers of bot attacks. Let’s learn about how they work, and tips for preventing them.
OWASP API Top 10 for Dummies Part I
OWASP API Top 10 for Dummies Part I Introduction In this blog series I will try to explain the most common threats for APIs using simple analogies. I started thinking about writing this blog last time I was visiting my grandfather. He asked me - “Inon, what do you do...
9 Must-Know Data Security Threats and How to Combat Them
9 Must-Know Data Security Threats and How to Combat Them Companies across all industries are increasing their use of data and analytics. According to one study, 50% of data and analytics leaders say business intelligence and analytics usage is increasing. What’s more,...
How to take a layered approach to API security
A popular fairy tale told in IT circles is that the internet is built on a perfectly orchestrated 7-layer stack. A popular extension of this notion is that enterprises can secure their infrastructure using a layered approach to security. Like most fairy tales, there is some truth in these stories.
Traceable AI Software Release – November 2021 Update
December has finally come and Traceable AI has released a whole new suite of software features for our customers, with the continued aim of ensuring the best API Security solution on the market.
API Observability: A framework for managing your applications in an API world
Today’s modern organizations are powered through mission-critical applications deployed in the cloud to drive their businesses. The building blocks of these applications are microservices developed by small teams of developers that enable rapid release cycles to deliver features to market more quickly. The connective tissue that binds these microservices together to work in tandem are APIs.
API Management Gateways Don’t Provide Enough Security
Bold security threats are giving rise to a new industry of API-specific security capabilities much more powerful than current management tools.
AWS WAF and CloudFront: How to Use Them Together
Security is really important. There is nothing like the gut-wrenching feeling of exposing users’ data. However, security isn’t the most exciting part of web development and is often ignored. Using AWS CloudFront and AWS WAF together, you can add some security to your sites with less work and focus on making features for your users.
How to Test API Security: A Guide and Checklist
APIs are the pipes that connect various applications and (micro)services. As data flows through them, security is of utmost importance to prevent data leakage. Also, since APIs are like doors into your application, they’re the obvious entry point for attackers who want to break your system.
WAF vs. RASP: A Comparison and Guide to Leveraging Both
The majority of organizations rely heavily on third-party web applications connected through APIs to generate revenue and serve customers. In many cases, these web applications contain security vulnerabilities.
4 Steps To Secure Requests Between Microservices
As microservices grow in popularity, they present attackers with more opportunities for API attacks. These new security approaches can help.
6 New Requirements for Securing Microservices vs. Monolithic Apps
The shift to microservices requires new ways to anticipate, plan, and protect web applications.
Application Security in the Public Cloud Requires Shared Responsibility
The shared responsibility model describes how security is shared by both the cloud provider and user. Here’s how modern application and API security requirements change the equation.