The inside trace. Subscribe for expert insights on application security. Thanks! Your subscription has been recorded. FEATUREDTraceable AI’s Renata Budko Reflects on Cybersecurity Career Accomplishments and Vast Opportunities for Other WomenTo stay relevant as a cybersecurity professional, you need to understand the microservices and what are the changes in architectures and APIs and how they can be attacked.API Securitycompany FEATUREDTraceable Enters Next Phase of Growth to Deliver Hyperscale API SecurityWe will continue to invest in building unassailable API security that operates at hyperscale for complete API discovery, posture management, protection, and operational analytics.API Securitycompany FEATUREDBuilding an API Security Solution FrameworkThe beginning of defining a framework for what requirements a good API security solution should meet. Intended to encourage a healthy discussion and be a tide that lifts all boats in getting to a more secure API-driven future.API Security FEATUREDShields up against Spring4shell attacks - Traceable AI Quick Start GuideSpring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Frameworkapp security 4.4.2022 Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework Spring4shell vulnerability (CVE-2022-22965) enables Remote Code Execution when using the Spring Framework app security 4.3.2022 APISecure: The First API Security Conference Makes Its Debut on the World Stage Cyberspace is the ultimate equalizer where it doesn’t matter how much money or resources a company has, everyone is equally vulnerable to a breach. API SecurityUncategorized 4.1.2022 How to Secure Microservices: The 6 Things You Can’t Forget Thinking about how to secure microservices? In this article you’ll find 6 things you can’t forget when it comes to microservices security. API Security 3.29.2022 Serverless vs Containers: What’s Right for Your Application? Serverless vs containers: Which one is right for your application? Learn more about these two main approaches to deploying applications. API Security 3.28.2022 What is a CRUD API? This post explains what a CRUD API is and how to apply it to different use cases to protect and interact with data in very specific ways. API Security 3.25.2022 My Design Internship at Traceable.ai I am grateful that I was entrusted with a role, which helped me grow as a designer. company 3.25.2022 Monolithic vs. Microservices Architecture: Which Should I Use? In this post we learn about monolithic vs microservices architectures and understand which to use and when. AI/ML 3.21.2022 5 Best Threat Hunting Tools for Your Security Team We now have advanced tools that can make threat hunting easier and more accessible. In this post, learn about 5 threat hunting tools for API security. API Security 3.20.2022 How to Mitigate DDoS Attacks on Your APIs Learn what DDoS is and what it can do to your API endpoints, how to mitigate DDOS attacks, and build a security response. API Security 3.18.2022 February | Traceable AI Feature Release Stay current with new developments from Traceable AI; including, new support for AWS Lambda serverless architecture and new privacy features for managing sensitive data. Releases search AI/MLAPI Securityapp securitybreach analysiscloud-nativecompanyDeveloperfoundationsObservabilityReleasestechnology reset