One stop shop

If all you have is a hammer...

2020 Net Promoter Score (NPS) Improves

Protect your Users from Friendly Fire in the War on Bots

Winning the battle  against blended threats

DDOS attacks and the 2020 election

Prune the Sprawl. Get Better AppSec.

Haven't you had your fill of credential stuffing?

The Many Faces of Bad Bots

Five Reasons Agentless AppSec is the Right Choice

Why it's Time to adopt a risk-based approach to appsec

This Way to WAAP++

3 Steps to Improve Your AppSec Using ThreatX and Splunk Phantom

Making the Change to Risk-Based AppSec

ThreatX Integrates with Cortex XSOAR by Palo Alto Networks

You Wouldn’t Buy a Home Without an Inspection. Why Buy a Company Without One?

Beware the WAF in WAAP Clothing

My First 100 Days

Meet PCI Requirements Consistently and Efficiently

Joining the Front Lines of AppSec

Two birds. One stone. Cut costs & Reduce AppSec Risk

Eliminate AppSec Sprawl

Fighting the AppSec Fight: Don't sell products. Create partnerships.

OWASP TOP 10: APIs Take Center Stage in Latest List of Priorities

Embedded in the ThreatX SOC: My First 30 Days

Better Security + More Efficient Ops with a Unified Approach to AppSec

ThreatX at Black Hat 2019: Find Out How We Can Cut Through the Noise of Your Job...In More Ways Than One

Detect & Prevent Newly Observed Malicious Automation Attacks

Why Security Teams Need to Virtual Patch

Top 4 Malicious Automation Attacks & How to Detect Them

Detecting Advanced Bots Using Active Interrogation

2019 Application Security Priorities - Stats & Trends

Flying Blind Into the Threat Visibility Gap

How and Why to Use APIs to Strengthen Your AppSec Strategy

Strengthen Your Web App Defenses Using Behavioral Analysis and Attacker Deception

Top API Security Challenges and How to Address Them Today

Web Application Firewalls 101 - Keywords to Bookmark

Malicious Bot Detection Through A Complex Proxy Network

Automation - Business Ally and Security Adversary?

Attacks Against IoT Devices Through APIs & How to Prevent Them

Best Practices for Automation in Cyber Security

How to Best Protect Applications in the Cloud

CIO Applications Names ThreatX In Top 25 Cyber Security Companies in 2019

Beyond Basic WAF Coverage - New ThreatX Capabilities

What's So "Next-Gen" About the Next-Gen WAF?

Using a Next-Gen WAF to Identify & Prevent Carding

API Security Lives at the Heart of the Breach

Using Next-Gen WAFs to Solve Modern AppSec Problems

Key Points for Building and Connecting Security-Friendly APIs

Top 6 Questions Around API and Microservices Security, Answered

How to Secure APIs & Microservices with a Next-Gen WAF

A CISO's Journey to Find a Web Application Firewall that Works

Machine Learning in Cybersecurity - Demystifying Buzzwords & Getting to the Truth

Too Little Too Late: ThreatX Predicts Cyber Vulnerabilities Will Go Largely Unaddressed...with Dire Consequences

ThreatX Recognized as a Finalist for Best Web Application Solution

The Rise of the Attacker-Centric Web Application Firewall (WAF)

Marriott’s Costly Mistake: Letting Compliance Trump Security

3 Hurdles Security Will Need to Clear to Succeed in a DevOps World

Top Cybersecurity Threats & How the WAF Must Evolve to Address Them

Shifting DevOps Models and Their Impact on Application Security Tools and Strategies

The New Age of Applications and What it Means for Security

IoT Cloud Portals - A Modern Day Hacker's Keys to the Kingdom

API Security Checklist: Top 7 Requirements

Too Busy Tuning Your WAF to Realize You Don't Have To?

How to Adequately Account for and Secure IoT Devices

Using the Web App Kill Chain to Identify & Neutralize Threats

Facing the Apache Struts Vulnerability with Confidence Using ThreatX

Tightly Coupling Applications and Security for Infinite Scale

From White Hat Hacker to CTO - An Interview with ThreatX's Andrew Useckas

Using Android Proxy Browsers - Convenience without Web Application Security

5 Negative Impacts of Misaligned Security Strategies

Meet ThreatX at Black Hat 2018

X Marks the Spot: Knowing Where and When to Block Threats

Combatting Botnet Traffic with Behavioral Analysis: Part III

The Proliferation of Web Application Attacks - "Ain't Nobody Got Time for That!"

Combatting Botnet Traffic with Behavioral Analysis: Part II

Using & Protecting Microservices - A Double-Edged Sword

Top 7 Frequently Asked Cybersecurity Questions, Answered.

Combatting Botnet Traffic with Behavioral Analysis: Part I

Unexpected Web Application Attacks: When Not to Trust Your Search Engine

The Silver Bullet for Mastering Threat Detection in the Hybrid Cloud

Binary Decisions vs Active Interrogation - The Debate for WAF Providers

Using Sophisticated WAF Technology to Put the Stop to Card Fraudsters: Part II

New from ThreatX - Enhanced Edge Caching, DDoS Mitigation & Bot Detection

You're Only as Strong as the Weakest Link in Your Web App Fence

Using Sophisticated WAF Technology to Put the Stop to Card Fraudsters: Part I

ThreatX Labs - Blog

Arm yourself with information and insights on the latest cybersecurity trends to defend against today's most advanced cyber criminals with articles from the leader in SaaS-based web application firewall solutions.

Subscribe Here!

Recent Posts

Follow Me