The Business Case for API Security: Why API Security? Why Now? We are just about to finish yet another year -- 2022. And in terms of cybersecurity and specifically, API Security, the past 12 months has been quite a challenge for many industries. As with any emerging...
Subscribe for expert insights to protect your applications.
Thanks! Your subscription has been recorded.
This whitepaper outlines why organizations need to implement an API Security program, citing numerous industry stats and analysis of recent API data breaches.
NextRoll Gains 8x Visibility into APIs and Solves API Sprawl It's time for another customer story from Traceable! Today's blog highlights NextRoll's journey to API Security, and specifically their struggle with API Sprawl and gaining visibility into all APIs. Let's...
Cloud DLP: What It Is and Why It's Needed The 21st century has moved data storage practices from traditional modes such as the use of hard drives to incorporate cloud-based methods. Cloud data storage involves storing data in a secure manner on the internet through a...
Black Friday Cybersecurity: Insights from Traceable Chief Security Officer, Richard Bird. It's that time again -- the season of Black Friday and Cyber Monday, and all the cybersecurity trimmings that come along with them. This time of year, retail and e-commerce shops...
Welcome back to our blog series on the OWASP API Top 10! In Part II, we tackle Lack of Rate Limiting, Broken Function Level Authorization (BFLA), and Mass Assignment.
In the API security risk assessment, our senior security engineers will show you where you are vulnerable, evaluate risk, obtain actionable intelligence, and show you how to build an enterprise-grade API security strategy. Download the datasheet to learn about our approach.
Read on to discover what a security posture is and tips for strengthening your posture to prevent attacks from causing significant damage.
Customer deep-dive on how they solved for API Sprawl, API Discovery and Threat Protection across multiple clouds.
Discover and secure your APIs, address systemic risk, and maintain stakeholder trust.
Learn the new paradigm of Zero Trust and how it can help your organization become more secure and resilient.
Many business leaders remain in the dark about the dangers of bot attacks. Let’s learn about how they work, and tips for preventing them.
We sit down with the author of GigaOm’s latest Radar Report for API Security to discuss his findings and recommendations.
API Abuse: Types, Causes, and How to Defend Against Them There are a few real-life analogies we can use to describe APIs. One is that they're like doors that provide access to an underlying system. It's an apt security analogy. You want doors to open smoothly and...
OWASP API Top 10 for Dummies Part I Introduction In this blog series I will try to explain the most common threats for APIs using simple analogies. I started thinking about writing this blog last time I was visiting my grandfather. He asked me - “Inon, what do you do...
9 Must-Know Data Security Threats and How to Combat Them Companies across all industries are increasing their use of data and analytics. According to one study, 50% of data and analytics leaders say business intelligence and analytics usage is increasing. What’s more,...
Highlights for Security Executives on Traceable’s API Security.
This Halloween, we’re gonna imagine the scariest thing possible: a world that is…suddenly…without APIs! Imagine it. You’re used to scrolling your smartphone, connecting to maps, music, and other apps in your car. You can order ahead on your phone, you can email any...
Jobvite partners with Traceable to gain visibility and protection of their APIs.
Learn from Traceable’s Chief Security Officer, Richard Bird, as he takes you through the top requirements needed for successful API governance.
Traceable Named a "Leader" in the 2022 GigaOm Radar for API Security Traceable has been named a Leader in the GigaOm Radar Report for API Security, and we are thrilled to be included and acknowledged in this emerging space! GigaOm Considerations for Leadership In...
Cybersecurity Roundup for 10/7/2022: the Uber Conviction, LAUSD Ransomware Attack, and New CISA Rules
This week brought us the Uber Conviction, new CISA rules on asset discovery scanning, and more details in the ransomware attack on the Los Angeles School District. Uber’s former chief security officer convicted over cover-up of 2016 data breach where hackers...
Traceable’s own Andrew Wesbecher discussed the importance of API security in the new, API-driven landscape of software development.
Cybersecurity Awareness Month 2022: New Theme, New Perspective It’s that time of year again – cybersecurity awareness month! This year’s CISA theme is See Yourself in Cyber. The intention is to bring awareness to the more human aspects of cybersecurity. Specifically,...
In this talk, we take a look at the practical issues of security APIs through the length of the MITRE framework.
Learn how Houwzer, a real estate and financial services company, deployed Traceable’s API security platform, for visibility and protection of all APIs.
Watch a demonstration of the Traceable platform. We show the importance of API exposure visibility, the realities of detection and prevention, and the role that analytics needs to play in the process.
NextRoll partners with Traceable for API Catalog to gain detailed API discovery and risk posture management at scale.
Learn how Traceable is delivering true Shift Left capabilities with API Security Testing and enabling teams to perform focused scans and detect API security issues in pre-production.
Both IT and Security leaders considering API security, this GigaOm report will help you to understand the market and what to consider when evaluating API Security solutions.
In this paper, SANS analyst Dave Shackelford independently reviews the Traceable AI platform for API Security. In the review, he outlines the platform, presents what he tested, and provides his overall impressions of its capabilities.
Walk through the Traceable product at your own pace, as you learn and manage your API security exposure.
Walk through the Traceable product, at your own pace, as you investigate malicious behavior and block all activity from the identified threat actor.
Walk through the Traceable product, at your own pace, as you explore API transaction data to investigate potential collateral damage from an attack and find details of an associated data breach.
We cover how building baselines of sensitive data usage can help prevent data exfiltration via APIs.
Listen to a few cautionary tales about how different teams left their APIs exposed and unintentionally opened their organization to API attacks and abuse.
Explore how observability through extended Berkeley Packet Filter can be leveraged for greater API security and how it can unlock deep application and API insight.
Today, we are excited to announce API Security Testing! This addition to our API Security platform brings fully automated, closed-loop security testing to organizations’ APIs. We all remember the famous phrase of Andreessen Horowitz, “Software is eating the world”. It...
With Traceable’s API security testing, you can eliminate the risk of vulnerable APIs in pre-prod, perform rapid scans that maintain speed of innovation, and automatically obtain remediation insights for developers to further secure their APIs.
When people think of software architecture, they often picture layers of code. But in recent years, there's been a shift from this model—known as the monolithic approach—toward a more modular development style. This new approach, known as microservices, has given rise...
The Black Hat Conference for 2022 has concluded and, once again, there was no shortage of new emerging security technologies, informative sessions, and broader concerns surrounding APIs, data security, the software supply chain and code security. The conference was...
Learn how Informatica works with Traceable to discover and protect all of their APIs at enterprise scale.
Learn how Traceable outperforms other API security vendors in an overview of our core differentiators.
This guide explores API governance, why it matters, how it benefits your organization and the things you need to build an effective API governance program.
This solutions brief explains and explores how extended Berkeley Packet Filter (eBPF) works for API observability, and how eBPF can unlock deep application and API insight.
Today, we are excited to announce enhanced data protection capabilities in our API Security platform component, API Protection! This update focuses on providing proactive protection against deeper and broader API abuse attempts that lead to fraud, and the compromising...
There is a better way to protect your APIs. Learn about Traceable’s API Security Platform benefits.
API Protection from Traceable automatically detects and stops known and unknown API attacks, business logic abuse attacks, as well as API abuse, fraud, and sensitive data exfiltration.
Learn the basics of API hacking including what they are, the API security top 10, and how you can test for vulnerabilities in your APIs.
Discover how Traceable gives customers a way to visualize the various paths of API calls, making it easier to discover and manage the risk exposure of anomalous user and API behaviors.