How to Secure APIs & Microservices with a Next-Gen WAF

Posted by Mackenzie Jacobson on Jan 8, 2019 12:17:18 PM

APIs have become a strategic necessity for conducting business due to the agility, innovation, and automation they enable. While 90% of the business reaps the benefits of this technology, the security teams are often exposed to a slew of new challenges that can’t be solved by long-standing security tools and strategies. In fact, according to Gartner1, by 2022, API abuses will be the most frequent attack vector resulting in data breaches for enterprise web applications. We are partnering with the team at SC Magazine to address this phenomenon in an upcoming webinar.

Read More

Topics: Web, Application & Hybrid Cloud Security

A CISO's Journey to Find a Web Application Firewall that Works

Posted by Mackenzie Jacobson on Jan 3, 2019 11:30:38 AM

Before joining ThreatX, Jeremiah Cruit was no stranger to Web Application Firewalls. As a seasoned CISO with 20+ years in the industry, he tried dozens of WAF solutions along the way. And with each solution, his faith in the effectiveness and usability of WAFs dwindled. So how did he end up at a WAF company? IDG Connect explored this and more about his past in the following interview. 

Read More

Topics: Company | News

Machine Learning in Cybersecurity - Demystifying Buzzwords & Getting to the Truth

Posted by Jeremiah Cruit | CISO on Dec 27, 2018 8:46:59 AM

Earlier this month, I had the opportunity to discuss the role of machine learning in security with Dave Shackleford from SANS. It was a fun discussion, and if you have the time, I encourage you to check it out here.

Read More

Topics: Web, Application & Hybrid Cloud Security

Too Little Too Late: ThreatX Predicts Cyber Vulnerabilities Will Go Largely Unaddressed...with Dire Consequences

Posted by Mackenzie Jacobson on Dec 20, 2018 3:39:53 PM

It's hard to believe, but the New Year is nearly upon us. 2018 was a busy year for cybersecurity, between regulatory changes and massive data breaches. Security teams were faced with obstacles that had never before been encountered and were forced to adapt. And while the year is coming to a close, the challenges are far from over. With new vulnerabilities arising from IoT-enabled innovations, an increase in sophisticated attacks due to bots leveraging AI, and the potential for a catastrophic breach in an established sector like utilities, 2019 is shaping up to be a challenging year on the cybersecurity front.

Read More

Topics: Web, Application & Hybrid Cloud Security, Company | News

ThreatX Recognized as a Finalist for Best Web Application Solution

Posted by Dru Jacobs | CMO on Dec 14, 2018 9:33:02 AM

We are thrilled to have been selected as a finalist in the SC Media Awards for Best Web Application Solution in the Trust Awards Category. As many of you are aware, the SC Awards are viewed by the security industry as the gold standard of excellence in cybersecurity and we’re in great company with the likes of Imperva, Akamai, WhiteHat Security, and Contrast Security.

Read More

Topics: Company | News

The Rise of the Attacker-Centric Web Application Firewall (WAF)

Posted by Jeremiah Cruit | CISO on Dec 10, 2018 9:56:41 AM

In this series of blog posts, we have been analyzing the major forces that are reshaping the way the industry approaches application security.In this post, we lay out the foundations for a new approach to security that not only solves the problems of the old approach to web application firewalls (WAFs), but also addresses the new challenges posed by the changing application and threat landscapes. In case you missed any of the previous sections, you can check them out here:

Read More

Topics: Web, Application & Hybrid Cloud Security

Marriott’s Costly Mistake: Letting Compliance Trump Security

Posted by Jeremiah Cruit | CISO on Dec 3, 2018 8:29:45 AM

Friday’s news of Marriott’s massive breach sent shock waves throughout the cybersecurity industry and consumer sectors alike. Brian Krebs described the “colossal intrusion” and numerous other security experts joined in to analyze what missteps the chain may have taken, how the breach could have been prevented, and what we as an industry can learn from the catastrophe.

Read More

Topics: Threat Intelligence

3 Hurdles Security Will Need to Clear to Succeed in a DevOps World

Posted by Andrew Useckas | CTO on Nov 27, 2018 7:48:09 AM

Historically, there has been no love lost between software developers and security teams. Dev teams are frustrated by the restrictive nature of the security standards placed on them as they often hinder rapid application development. On the flip side, security teams see developers as one of the top threats to the integrity and success of their security strategy.

Read More

Topics: Web, Application & Hybrid Cloud Security

Threat X Labs - Blog

Arm yourself with information and insights on the latest cybersecurity trends to defend against today's most advanced cyber criminals with articles from the leader in SaaS-based web application firewall solutions.

Subscribe Here!

Recent Posts

Follow Me