Digital transformation taking shape in 2021

Welcome to the New Year, where we believe most organizations will continue to work through their digital transformation practices. These updated practices heavily impact IT and business leaders who need to expedite their migration to public clouds and … Continue reading Digital transformation taking shape in 2021

Essential features of security automation for the AWS platform

DevSecOps tactics and tools are dramatically changing the way organizations bring their applications to fruition. Having a mindset that security must be incorporated into every stage of the software development lifecycle – and that everyone is responsi… Continue reading Essential features of security automation for the AWS platform

Data Theorem Launches Industry’s First Full-Stack Application Security Analyzer to Prevent Data Breaches Across Modern Web and Cloud Services

New AppSec Solution Web Secure Automates Analysis and Remediation to Address Modern Web and Single-Page Application Security Issues that have Plagued the Industry for Years PALO ALTO, Calif., June 24, 2020 – Data Theorem, Inc., a leading provider of mo… Continue reading Data Theorem Launches Industry’s First Full-Stack Application Security Analyzer to Prevent Data Breaches Across Modern Web and Cloud Services

The security challenges that come with serverless computing

Serverless computing (aka Function-as-a-Service) has been a boon to many enterprises: it simplifies the code development and deployment processes while improving utilization of server resources, minimizing costs and reducing security overhead. “S… Continue reading The security challenges that come with serverless computing

Serverless, shadow APIs and Denial of Wallet attacks

In this Help Net Security podcast, Doug Dooley, Chief Operating Officer at Data Theorem, discusses serverless computing, a new area that both DevOps leaders and enterprise security leaders are having to tackle. Here’s a transcript of the podcast for yo… Continue reading Serverless, shadow APIs and Denial of Wallet attacks

Webinar: Top 6 security needs for APIs and serverless apps

Serverless computing is gaining momentum among developers. Software engineers are now able to build applications that deliver scale and business value without consideration for the complexity of operations and security. However, to believe there are fe… Continue reading Webinar: Top 6 security needs for APIs and serverless apps

Bring visibility to shadow APIs and ensure that security standards are being met

Last week Data Theorem introduced the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s enterprise serverless and microservices applications. We took this opportunit… Continue reading Bring visibility to shadow APIs and ensure that security standards are being met

New infosec products of the week​: October 26, 2018

Data Theorem introduces automated API discovery and security inspection solution Data Theorem introduced the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s enterp… Continue reading New infosec products of the week​: October 26, 2018

Data Theorem introduces automated API discovery and security inspection solution

Data Theorem introduced today the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s enterprise serverless and microservices applications, including Shadow APIs. With… Continue reading Data Theorem introduces automated API discovery and security inspection solution

Who’s trying to eavesdrop on your customers’ encrypted mobile traffic?

The number one source of TLS/SSL Man in the Middle (MitM) attacks on encrypted mobile traffic are not corporate firewalls or captive portals used by hotels, airports and other organizations offering free Wi-Fi access – it’s spyware. “A big chunk … Continue reading Who’s trying to eavesdrop on your customers’ encrypted mobile traffic?