fbpx

Cloud-native

Subscribe for expert insights to protect your applications.

Thanks! Your subscription has been recorded.

OWASP API Top 10 for Dummies Part I

OWASP API Top 10 for Dummies Part I

OWASP API Top 10 for Dummies Part I Introduction In this blog series I will try to explain the most common threats for APIs using simple analogies. I started thinking about writing this blog last time I was visiting my grandfather. He asked me - “Inon, what do you do...

9 Must-Know Data Security Threats and How to Combat Them

9 Must-Know Data Security Threats and How to Combat Them

9 Must-Know Data Security Threats and How to Combat Them Companies across all industries are increasing their use of data and analytics. According to one study, 50% of data and analytics leaders say business intelligence and analytics usage is increasing. What’s more,...

A New Perspective from Log4shell: Exploit Prevention from Containers to APIs

A New Perspective from Log4shell: Exploit Prevention from Containers to APIs

There is no fixed perimeter in the cloud, as microservices and applications connect through APIs. In the cloud, containers are created and destroyed depending on business demand, your infrastructure isn’t permanent, rather it’s ephemeral. Learn how to approach security in cloud native and containers.

Traceable Overview Demo

Traceable Overview Demo

In this 12 minute video see an overview of Traceable and how it uses security observability with artificial intelligence and machine learning to secure modern application architectures and their API’s.

Can Security Keep up with the Pace of Change?

Can Security Keep up with the Pace of Change?

New technologies are revolutionizing software development, but they potentially come with their own vulnerabilities. Is modern application development leaving you open to attack?