Winning the battle against blended threats
The post Winning the battle against blended threats appeared first on Security Boulevard.
Continue reading Winning the battle against blended threats
Collaborate Disseminate
The post Winning the battle against blended threats appeared first on Security Boulevard.
Continue reading Winning the battle against blended threats
“We are all just prisoners here of our own device.” –The Eagles
“Help me get rid of some of this stuff, or I’m gonna f’n lose it.”–Anonymous CISO
I’m going to go out on a very sturdy limb and say that The Eagles weren’t thinking about cybers… Continue reading Prune the Sprawl. Get Better AppSec.
Bad bots and malicious automation are one of the few technology challenges that can materially impact on every business team inside an organization. With up to 50% of Internet traffic generated by bots, organizations are awash in a sea of automate… Continue reading The Many Faces of Bad Bots
I’m a big fan of the ThreatX agentless architecture. It simplifies many of aspects of deployment and side-steps a lot of the problems with agent-based architecture.
The post Five Reasons Agentless AppSec is the Right Choice appeared first on Secu… Continue reading Five Reasons Agentless AppSec is the Right Choice
Today I am proud to announce the integration of the ThreatX WAAP with the Palo Alto Networks XSOAR platform. You can read the official announcement for more details here. This integration is exciting for me personally because it tackles one of the… Continue reading ThreatX Integrates with Cortex XSOAR by Palo Alto Networks
OWASP recently released the first iteration of the API Security Top 10. Like the ubiquitous OWASP Top 10, the API Security Top 10 delivers a prioritized list of the most critical application security issues with a focus on the API side of applications…. Continue reading OWASP TOP 10: APIs Take Center Stage in Latest List of Priorities
As the demands of both modern applications and complex threat landscapes have continued to increase, many organizations have been forced to adopt an ever-growing list of new, specialized security tools in an attempt to keep pace. This often includ… Continue reading Better Security + More Efficient Ops with a Unified Approach to AppSec
We live in a world where new application security vulnerabilities are discovered daily. Additionally, the advent of botnets and crypto currency mining has increased the attractiveness of targets. There are two major techniques utilized by attacker… Continue reading Why Security Teams Need to Virtual Patch
Application security never fails to keep us on our toes. Between the continuous evolution of application frameworks and integrations, and the advancement of human and automated attackers, security teams must always be braced for change and new cha… Continue reading 2019 Application Security Priorities – Stats & Trends
APIs are at the heart of modern applications and have quickly become a favorite target of attackers. And for good reason – they expose a wealth of functionality and attack surface that is often poorly defended. In our previous article we introduce… Continue reading How and Why to Use APIs to Strengthen Your AppSec Strategy