Subscribe for expert insights to protect your applications.
M6 and M7 bring GraphQL and gRPC, new agent support, OpenTelemetry compatibility, business risk visibility and API risk scoring, many new and configurable blocking rules, lots of new discovered data on your API endpoints, and improved enterprise readiness.
M6 and M7 bring GraphQL and gRPC, new agent support, OpenTelemetry compatibility, business risk visibility and API risk scoring, many new and configurable blocking rules, lots of new discovered data on your API endpoints, and improved enterprise readiness.
SecOps keeps production environments safe. Now, “shifting left” approaches are needed to secure production applications and APIs.
SecOps keeps production environments safe. Now, “shifting left” approaches are needed to secure production applications and APIs.
RASPs complement perimeter defense systems, but they also have weaknesses that can introduce their own vulnerabilities.
RASPs complement perimeter defense systems, but they also have weaknesses that can introduce their own vulnerabilities.
New tech transform dev - but with risk
New tech transform dev - but with risk
Moving from local monoliths to cloud based microservices
Moving from local monoliths to cloud based microservices
API Security and the SolarWinds Breach: a wake up call
API Security and the SolarWinds Breach: a wake up call
What if we could reduce the time to detect a cyber attack all the way down to zero?
What if we could reduce the time to detect a cyber attack all the way down to zero?
The popularity of cloud-based computing has made API security the next big challenge...
The popularity of cloud-based computing has made API security the next big challenge...
Six factors to get right when planning Kubernetes architecture.
Six factors to get right when planning Kubernetes architecture.
Cybersecurity is a key part of enterprise risk management in financial services
Cybersecurity is a key part of enterprise risk management in financial services
How do you know your apps are protected?
How do you know your apps are protected?
Common internal and external threats and the Zero Trust practices to address them.
Common internal and external threats and the Zero Trust practices to address them.
PartII: API Security in Modern Applications
PartII: API Security in Modern Applications
A Practitioner's View
A Practitioner's View
Part I: What are Modern Applications
Part I: What are Modern Applications
An introduction to anomaly detection in the context of distributed tracing.
An introduction to anomaly detection in the context of distributed tracing.