All resources sponsored by:

Traceable

21 Matches
Everything You Need to Know About Authentication and Authorization in Web APIs - Part 1
sponsored by Traceable
RESOURCE:Securing APIs is vastly different than securing applications – which means that your approach to authenticate and authorize users across your apps won’t work with web APIs. Read this article to learn everything you need to know about authentication and authorization in Web APIs.
Posted: 14 May 2021 | Published: 26 Mar 2021
Get This Now

TOPICS:  Cybersecurity

WAF Versus NGWAF: How They Evolved and Where They Still Fall Short
sponsored by Traceable
RESOURCE:WAFs have made it safe to allow companies to connect more critical services, data and applications by filtering traffic. Today, next-gen WAFs have evolved to include advanced features and provide even greater detection. Download this resource to explore the evolution of WAFs and the rise of NGWAFs.
Posted: 14 May 2021 | Published: 23 Apr 2021
Get This Now

TOPICS:  .NET

How To Avoid Exposing Private Data By Securing APIs
sponsored by Traceable
WHITE PAPER:APIs keep us conveniently connected on a daily basis, but they do come with one fundamental flaw: There is no standard way to develop APIs that can ensure security on a specific level, which puts data at risk. But by understanding the big picture behind API transactions, you can protect APIs holistically. View this white paper to learn more.
Posted: 14 May 2021 | Published: 16 Apr 2021
Get This Now

TOPICS:  .NET

The Prescription for Vulnerable Mobile Health Apps: Protect APIs
sponsored by Traceable
WHITE PAPER:API attacks are on a steep rise. In fact, Gartner predicts that “by 2022, API abuses will move from an infrequent to the most-frequent attack vector, resulting in data breaches for enterprise web applications.” It’s time to learn how to protect your APIs. Get started here.
Posted: 13 May 2021 | Published: 13 May 2021
Get This Now

TOPICS:  .NET

How RASP Has Transformed App Security. What’s Next?
sponsored by Traceable
RESOURCE:In response to the limitations of traditional application security (AppSec) technologies and capabilities, organizations have begun embracing the benefits of Runtime Application Security-Protection (RASP) tools. But what is RASP, and how is it better than existing AppSec tools? Read this article to find out.
Posted: 13 May 2021 | Published: 27 Apr 2021
Get This Now

TOPICS:  Cybersecurity

The Consequences of Poor Authentication and Authorization Practices in APIs
sponsored by Traceable
RESOURCE:In this article, uncover examples of real-world API vulnerabilities (Shopify and Facebook) to understand how attackers could breach your defenses. And uncover what to look for when designing and building your authentication (authN) and authorization (authZ) system.
Posted: 11 May 2021 | Published: 11 May 2021
Get This Now


API Security Challenges: How to Manage APIs Amidst Continuous Change
sponsored by Traceable
WHITE PAPER:In this article, explore what API security and management for an always-on world looks like, which trends are in the works, and what technologies and strategies are keeping developers one step ahead. Click here to read the full article.
Posted: 11 May 2021 | Published: 11 May 2021
Get This Now

TOPICS:  .NET

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER:Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021
Get This Now


Protecting Against the Hidden Threats of New Technologies
sponsored by Traceable
RESOURCE:Software development is being revolutionized by tools like GraphQL, but these new technologies also bring unknown security risks with them. Read this Traceable post to learn some of the biggest challenges facing modern application security, the shortcomings of legacy security, and strategies and solutions tackling this new wave of problems.
Posted: 22 Feb 2021 | Published: 22 Feb 2021
Get This Now


Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER:Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021
Get This Now


Traceable Enables Security To Keep Up With Engineering And The Continuous Pace Of Change
sponsored by Traceable
DATA SHEET:Learn how Traceable applies the power of machine learning and application observability to understand the DNA of an application, how it's changing, and where there are anomalies in order to detect and block threats.
Posted: 19 Feb 2021 | Published: 19 Feb 2021
Get This Now


Why Web App Firewalls Aren’t Protecting Your Cloud-Native Apps
sponsored by Traceable
RESOURCE:Take a look at what NG-WAFs do well, what they struggle with, and whether a solution makes up for their gaps.
Posted: 19 Feb 2021 | Published: 19 Feb 2021
Get This Now


Modern Application Security and Supply Chain Attacks – 3 Challenges
sponsored by Traceable
RESOURCE:In the wake of the recent SolarWinds breach, The OWASP API project set out to better understand the evolving API attack surface and highlight the 10 most critical API vulnerabilities. Read this article for a closer look at 3 of these API threats; microservice proliferation, application change, and porous perimeters.
Posted: 18 Feb 2021 | Published: 18 Feb 2021
Get This Now

TOPICS:  Cybersecurity

API and Modern Application Security
sponsored by Traceable
WHITE PAPER:Over the past 15 years, there has been a global movement towards cloud-native business application architectures – which necessitated organizations to re-think how they protect their apps and APIs. Read this white paper to learn about the challenges and opportunities involved in transitioning from traditional to modern app and API security.
Posted: 18 Feb 2021 | Published: 18 Feb 2021
Get This Now

TOPICS:  Cybersecurity

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO:The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021
Get This Now


What AI can do for API Security
sponsored by Traceable
VIDEO:Join security and DevOps experts as they discuss how TraceAI from Traceable uses machine learning for cloud-native application security.
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021
Get This Now


A Better Way to Secure Your Apps and APIs
sponsored by Traceable
VIDEO:Get an introduction to Traceable's application security platform for cloud-native applications and APIs. In this video, you’ll learn about the application security market from the perspectives of Greg Phillips, Traceable customer and CTO at Houwzer and Traceable advisors Andreas Wuchner (Credit Suisse) and Martin Rues (Outreach Corporation).
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021
Get This Now


API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST:Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020
Get This Now


Secure your GraphQL & gRPC APIs
sponsored by Traceable
VIDEO:In this webinar, security experts discuss how optimal application and API architecture requires the use of new protocols. Tune in as they cover the use of Traceable for cloud-native application visibility, protecting external and internal APIs from OWASP Top 10 risks, and more.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021
Get This Now


What Runtime Application Self-Protection (RASP) Doesn’t Solve
sponsored by Traceable
RESOURCE:Tap into this article for RASP’s or Runtime Application Self-Protection’s, strengths and weaknesses in protecting against modern security threats.
Posted: 12 Feb 2021 | Published: 12 Feb 2021
Get This Now


Traceable Overview CTA Demo
sponsored by Traceable
VIDEO:View this video overview of Traceable and how it uses security observability with artificial intelligence and machine learning to secure modern application architectures and their API's.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021
Get This Now


21 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences