Evolution of Attack Surface Management

| | API security
The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began with basic asset management practices in the late 1990s and early 2000s ...

What is Gift Card and Loyalty Program Abuse?

Gift cards and loyalty programs are used by retailers to increase customer traffic, build brand awareness, and gain new customers. However, they also attract the attention of fraudsters who exploit these systems, ...
appsentinels integration

Strengthening API Security with AppSentinels Integration in the Strobes Platform

APIs are the backbone of apps and cloud services, making everything work seamlessly behind the scenes. But with their power comes a unique set of security challenges that can’t be... The post ...
Escape vs Rapid7

Escape vs Rapid7

Discover why Escape is a better API security solution ...

What You Missed About the CrowdStrike Outage:: The Next Strike Might Be Linux Due to eBPF

| | API security
The Other Crowdstrike Outage On July 19, 2024, a flawed update in CrowdStrike Falcon's channel file 291 led to a logic error that caused Windows systems to crash, resulting in widespread BSOD ...

Unveiling Top API Vulnerabilities and Emerging Trends: Introducing the Wallarm Q2 2024 API ThreatStats™ Report

| | API security
As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulnerability and threat landscape. Our latest Q2 ThreatStats™ Report reveals critical trends and developments that are reshaping ...

Ensuring High-Efficacy Zero-Knowledge API Discovery

| | API security
Most organizations do not have an accurate estimate of their API footprints – and why would they? With the rate at which APIs are getting churned out or updated, it’s a significant ...
A photo of the Cequence booth staff in front of the futuristic-looking Cequence trade show booth at the Black Hat 2024 conference.

Cequence Storms Black Hat with API Security Testing for Generative AI Applications

That’s a wrap for Black Hat 2024! We had a great show and met many of you at the booth or on the show floor. I hope you were able to come ...

Empowering the Shift: From Integration to Innovation in Application Security

Last month, we explored how organizations can reclaim control over their Application Security (AppSec). Building on that discussion, we now delve deeper into the transformative steps necessary for security decision-makers to redefine ...

Application Security Check Up