fbpx

API security

Subscribe for expert insights to protect your applications.

Thanks! Your subscription has been recorded.

The Business Case for API Security: Why API Security? Why Now?

The Business Case for API Security: Why API Security? Why Now?

The Business Case for API Security: Why API Security? Why Now? We are just about to finish yet another year -- 2022. And in terms of cybersecurity and specifically, API Security, the past 12 months has been quite a challenge for many industries. As with any emerging...

The Business Case for API Security

The Business Case for API Security

This whitepaper outlines why organizations need to implement an API Security program, citing numerous industry stats and analysis of recent API data breaches.

NextRoll Gains 8x Visibility into APIs and Solves API Sprawl

NextRoll Gains 8x Visibility into APIs and Solves API Sprawl

NextRoll Gains 8x Visibility into APIs and Solves API Sprawl It's time for another customer story from Traceable! Today's blog highlights NextRoll's journey to API Security, and specifically their struggle with API Sprawl and gaining visibility into all APIs. Let's...

Cloud DLP: What It Is and Why It’s Needed

Cloud DLP: What It Is and Why It’s Needed

Cloud DLP: What It Is and Why It's Needed The 21st century has moved data storage practices from traditional modes such as the use of hard drives to incorporate cloud-based methods. Cloud data storage involves storing data in a secure manner on the internet through a...

API Security Risk Assessment

API Security Risk Assessment

In the API security risk assessment, our senior security engineers will show you where you are vulnerable, evaluate risk, obtain actionable intelligence, and show you how to build an enterprise-grade API security strategy. Download the datasheet to learn about our approach.

API Abuse: Types, Causes, and How to Defend Against Them

API Abuse: Types, Causes, and How to Defend Against Them

API Abuse: Types, Causes, and How to Defend Against Them There are a few real-life analogies we can use to describe APIs. One is that they're like doors that provide access to an underlying system. It's an apt security analogy. You want doors to open smoothly and...

OWASP API Top 10 for Dummies Part I

OWASP API Top 10 for Dummies Part I

OWASP API Top 10 for Dummies Part I Introduction In this blog series I will try to explain the most common threats for APIs using simple analogies. I started thinking about writing this blog last time I was visiting my grandfather. He asked me - “Inon, what do you do...

9 Must-Know Data Security Threats and How to Combat Them

9 Must-Know Data Security Threats and How to Combat Them

9 Must-Know Data Security Threats and How to Combat Them Companies across all industries are increasing their use of data and analytics. According to one study, 50% of data and analytics leaders say business intelligence and analytics usage is increasing. What’s more,...

Scary Thoughts This Halloween: A World Without APIs!

Scary Thoughts This Halloween: A World Without APIs!

This Halloween, we’re gonna imagine the scariest thing possible: a world that is…suddenly…without APIs! Imagine it. You’re used to scrolling your smartphone, connecting to maps, music, and other apps in your car. You can order ahead on your phone, you can email any...

Cybersecurity Awareness Month 2022: New Theme, New Perspective

Cybersecurity Awareness Month 2022: New Theme, New Perspective

Cybersecurity Awareness Month 2022: New Theme, New Perspective It’s that time of year again – cybersecurity awareness month! This year’s CISA theme is See Yourself in Cyber. The intention is to bring awareness to the more human aspects of cybersecurity. Specifically,...

Are Your APIs Exposed?

Are Your APIs Exposed?

Watch a demonstration of the Traceable platform. We show the importance of API exposure visibility, the realities of detection and prevention, and the role that analytics needs to play in the process.

GigaOm Radar for API Security

GigaOm Radar for API Security

Both IT and Security leaders considering API security, this GigaOm report will help you to understand the market and what to consider when evaluating API Security solutions.

SANS Traceable Product Review: Are Your APIs Exposed?

SANS Traceable Product Review: Are Your APIs Exposed?

In this paper, SANS analyst Dave Shackelford independently reviews the Traceable AI platform for API Security. In the review, he outlines the platform, presents what he tested, and provides his overall impressions of its capabilities.

Gain API Security Insights – Self-Guided Demo

Gain API Security Insights – Self-Guided Demo

Walk through the Traceable product, at your own pace, as you explore API transaction data to investigate potential collateral damage from an attack and find details of an associated data breach.

Traceable Adds API Security Testing to it’s Platform

Traceable Adds API Security Testing to it’s Platform

Today, we are excited to announce API Security Testing! This addition to our API Security platform brings fully automated, closed-loop security testing to organizations’ APIs. We all remember the famous phrase of Andreessen Horowitz, “Software is eating the world”. It...

API Security Testing

API Security Testing

With Traceable’s API security testing, you can eliminate the risk of vulnerable APIs in pre-prod, perform rapid scans that maintain speed of innovation, and automatically obtain remediation insights for developers to further secure their APIs.

API Sprawl: What It Is and Why You Should Care

API Sprawl: What It Is and Why You Should Care

When people think of software architecture, they often picture layers of code. But in recent years, there's been a shift from this model—known as the monolithic approach—toward a more modular development style. This new approach, known as microservices, has given rise...

Black Hat 2022 Recap: API Security and Data Security Top the List

Black Hat 2022 Recap: API Security and Data Security Top the List

The Black Hat Conference for 2022 has concluded and, once again, there was no shortage of new emerging security technologies, informative sessions, and broader concerns surrounding APIs, data security, the software supply chain and code security. The conference was...

The CISO’s Guide to API Governance

The CISO’s Guide to API Governance

This guide explores API governance, why it matters, how it benefits your organization and the things you need to build an effective API governance program.

API Protection

API Protection

API Protection from Traceable automatically detects and stops known and unknown API attacks, business logic abuse attacks, as well as API abuse, fraud, and sensitive data exfiltration.

API Hacking 101

API Hacking 101

Learn the basics of API hacking including what they are, the API security top 10, and how you can test for vulnerabilities in your APIs.

Security Observability: Why Tracing?

Security Observability: Why Tracing?

Discover how Traceable gives customers a way to visualize the various paths of API calls, making it easier to discover and manage the risk exposure of anomalous user and API behaviors.