Top 6 Questions Around API and Microservices Security, Answered

Last week we had a great webcast and discussion on the topic of securing APIs and microservice architectures. Based on the feedback during the webcast and the many conversations we have with prospects, this is becoming a very hot topic (and source… Continue reading Top 6 Questions Around API and Microservices Security, Answered

How to Secure APIs & Microservices with a Next-Gen WAF

APIs have become a strategic necessity for conducting business due to the agility, innovation, and automation they enable. While 90% of the business reaps the benefits of this technology, the security teams are often exposed to a slew of new chall… Continue reading How to Secure APIs & Microservices with a Next-Gen WAF

Machine Learning in Cybersecurity – Demystifying Buzzwords & Getting to the Truth

Earlier this month, I had the opportunity to discuss the role of machine learning in security with Dave Shackleford from SANS. It was a fun discussion, and if you have the time, I encourage you to check it out here.
The post Machine Learning i… Continue reading Machine Learning in Cybersecurity – Demystifying Buzzwords & Getting to the Truth

Too Little Too Late: ThreatX Predicts Cyber Vulnerabilities Will Go Largely Unaddressed…with Dire Consequences

It’s hard to believe, but the New Year is nearly upon us. 2018 was a busy year for cybersecurity, between regulatory changes and massive data breaches. Security teams were faced with obstacles that had never before been encountered and were for… Continue reading Too Little Too Late: ThreatX Predicts Cyber Vulnerabilities Will Go Largely Unaddressed…with Dire Consequences

Too Little Too Late: ThreatX Predicts Cyber Vulnerabilities Will Go Largely Unaddressed…with Dire Consequences

It’s hard to believe, but the New Year is nearly upon us. 2018 was a busy year for cybersecurity, between regulatory changes and massive data breaches. Security teams were faced with obstacles that had never before been encountered and were for… Continue reading Too Little Too Late: ThreatX Predicts Cyber Vulnerabilities Will Go Largely Unaddressed…with Dire Consequences

The Rise of the Attacker-Centric Web Application Firewall (WAF)

In this series of blog posts, we have been analyzing the major forces that are reshaping the way the industry approaches application security.In this post, we lay out the foundations for a new approach to security that not only solves the probl… Continue reading The Rise of the Attacker-Centric Web Application Firewall (WAF)

3 Hurdles Security Will Need to Clear to Succeed in a DevOps World

Historically, there has been no love lost between software developers and security teams. Dev teams are frustrated by the restrictive nature of the security standards placed on them as they often hinder rapid application development. On the flip s… Continue reading 3 Hurdles Security Will Need to Clear to Succeed in a DevOps World

Top Cybersecurity Threats & How the WAF Must Evolve to Address Them

In this series of articles, we’ve been exploring the various ways that application security is evolving and what it means for modern security teams. In the first article, we analyzed how virtually all applications have evolved to be web-f… Continue reading Top Cybersecurity Threats & How the WAF Must Evolve to Address Them

Shifting DevOps Models and Their Impact on Application Security Tools and Strategies

While application security has never been more advanced, one could argue that it has also never been more difficult. Keeping pace with the growth and evolution of applications, evaluating the endless number of available solutions, and recruitin… Continue reading Shifting DevOps Models and Their Impact on Application Security Tools and Strategies