All resources sponsored by:

Traceable

14 Matches
3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER:Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021
Get This Now


Protecting Against the Hidden Threats of New Technologies
sponsored by Traceable
RESOURCE:Software development is being revolutionized by tools like GraphQL, but these new technologies also bring unknown security risks with them. Read this Traceable post to learn some of the biggest challenges facing modern application security, the shortcomings of legacy security, and strategies and solutions tackling this new wave of problems.
Posted: 22 Feb 2021 | Published: 22 Feb 2021
Get This Now


Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER:Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021
Get This Now


Traceable Enables Security To Keep Up With Engineering And The Continuous Pace Of Change
sponsored by Traceable
DATA SHEET:Learn how Traceable applies the power of machine learning and application observability to understand the DNA of an application, how it's changing, and where there are anomalies in order to detect and block threats.
Posted: 19 Feb 2021 | Published: 19 Feb 2021
Get This Now


Why Web App Firewalls Aren’t Protecting Your Cloud-Native Apps
sponsored by Traceable
RESOURCE:Take a look at what NG-WAFs do well, what they struggle with, and whether a solution makes up for their gaps.
Posted: 19 Feb 2021 | Published: 19 Feb 2021
Get This Now


Modern Application Security and Supply Chain Attacks – 3 Challenges
sponsored by Traceable
RESOURCE:In the wake of the recent SolarWinds breach, The OWASP API project set out to better understand the evolving API attack surface and highlight the 10 most critical API vulnerabilities. Read this article for a closer look at 3 of these API threats; microservice proliferation, application change, and porous perimeters.
Posted: 18 Feb 2021 | Published: 18 Feb 2021
Get This Now

TOPICS:  Cybersecurity

API and Modern Application Security
sponsored by Traceable
WHITE PAPER:Over the past 15 years, there has been a global movement towards cloud-native business application architectures – which necessitated organizations to re-think how they protect their apps and APIs. Read this white paper to learn about the challenges and opportunities involved in transitioning from traditional to modern app and API security.
Posted: 18 Feb 2021 | Published: 18 Feb 2021
Get This Now

TOPICS:  Cybersecurity

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO:The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021
Get This Now


What AI can do for API Security
sponsored by Traceable
VIDEO:Join security and DevOps experts as they discuss how TraceAI from Traceable uses machine learning for cloud-native application security.
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021
Get This Now


A Better Way to Secure Your Apps and APIs
sponsored by Traceable
VIDEO:Get an introduction to Traceable's application security platform for cloud-native applications and APIs. In this video, you’ll learn about the application security market from the perspectives of Greg Phillips, Traceable customer and CTO at Houwzer and Traceable advisors Andreas Wuchner (Credit Suisse) and Martin Rues (Outreach Corporation).
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021
Get This Now


API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST:Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020
Get This Now


Secure your GraphQL & gRPC APIs
sponsored by Traceable
VIDEO:In this webinar, security experts discuss how optimal application and API architecture requires the use of new protocols. Tune in as they cover the use of Traceable for cloud-native application visibility, protecting external and internal APIs from OWASP Top 10 risks, and more.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021
Get This Now


What Runtime Application Self-Protection (RASP) Doesn’t Solve
sponsored by Traceable
RESOURCE:Tap into this article for RASP’s or Runtime Application Self-Protection’s, strengths and weaknesses in protecting against modern security threats.
Posted: 12 Feb 2021 | Published: 12 Feb 2021
Get This Now


Traceable Overview CTA Demo
sponsored by Traceable
VIDEO:View this video overview of Traceable and how it uses security observability with artificial intelligence and machine learning to secure modern application architectures and their API's.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021
Get This Now


14 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info