Best Practices for Automation in Cyber Security

Posted by Jeremiah Cruit | CISO on Apr 1, 2019 1:25:37 PM

Automation has become a central component to growing and successful businesses. This holds true in the cybersecurity sector as well, specifically with identity and access management, patching, and network change management. No matter the business, the goal of automation remains the same - improving response and task completion times or freeing skilled human labor from mundane tasks. And while automation successfully returns those benefits, among many others, if automation functions are not implemented with a few key considerations, the implications can end up outweighing the benefits.

Read More

Topics: Web, Application & Hybrid Cloud Security

How to Best Protect Applications in the Cloud

Posted by Bob Violino on Mar 26, 2019 4:00:00 AM

Organizations are moving more applications to the cloud as they look to reap benefits such as cost savings, easier scalability, and greater agility. Many of these business applications hold and exchange critical, highly sensitive data, and have therefore become prime targets for hackers and other cyber criminals looking to exploit the information.

Read More

CIO Applications Names ThreatX In Top 25 Cyber Security Companies in 2019

Posted by Mackenzie Jacobson on Mar 18, 2019 7:43:41 AM

Cyber security has never been more important than it is today. The "Internet-era" has ushered in faster and more exciting ways of conducting business, along with a myriad of new challenges for security teams. In an attempt to cover a growing number of bases, businesses are allocating larger share of their budgets to security tools and talent. To add to the complexity of this dilemma, the sheer number of cyber security tools is increasing and it can be difficult for organizations to sort through and effectively asses all of those providers. To help C-Level Execs and security teams with this task, CIO Applications recruited a panel of experienced cyber security professionals to compile a list of cyber security solution providers that exhibit innovative technologies and strategies. ThreatX is now proud to announce its inclusion on 2019's "Top 25 Cyber Security Companies."

Read More

Topics: Company | News

Beyond Basic WAF Coverage - New ThreatX Capabilities

Posted by Dru Jacobs | CMO on Mar 7, 2019 1:12:52 PM

The ongoing shifts in application technology, cloud migration, and DevOps means it’s imperative to align your web application protection strategy with your dynamic application environment. ThreatX has some powerful new capabilities that take you far beyond the basic protection afforded by legacy WAFs to while minimizing false positives and reducing overhead for optimized security teams. Read on to see what our customers are taking advantage of everyday to protect their apps against top threats:

Read More

Topics: Company | News

What's So "Next-Gen" About the Next-Gen WAF?

Posted by Kelly Brazil | VP of Sales Engineering on Feb 27, 2019 7:10:43 AM

The term “next-generation” gets thrown around a lot in security. Marketers have overused the term to the point that, for many, it has become an empty buzzword used to describe virtually anything. On the other hand, technology does go through major transformational changes where new approaches are needed to replace the old ways of doing things. The rise of next-generation firewalls (NGFWs), which replaced the old port-based firewalls are a classic example of this sort of transformation.

Read More

Topics: Web, Application & Hybrid Cloud Security

Using a Next-Gen WAF to Identify & Prevent Carding

Posted by Jeremiah Cruit | CISO on Feb 21, 2019 8:16:03 AM

As more and more businesses elect to conduct business online, not only are they subject to additional threats, but their customers are as well. For customers, this is especially true when using and submitting credit cards to complete online transactions. One of the most common attacks in this space is Carding. Carding occurs when an attacker utilizes illegally obtained credit card information (often in bulk), attempts to validate the stolen card numbers, and sells/utilizes the valid credit card information. In 2018, credit card fraud was expected to exceed $6 billion*. This number is only expected to grow as online shopping becomes more widespread and accepted.

Read More

Topics: Threat Intelligence

API Security Lives at the Heart of the Breach

Posted by David Geer on Feb 13, 2019 6:57:00 AM

*We are thrilled to introduce and feature David Geer on the ThreatX Blog. David is a content marketing writer and market influencer specializing in cybersecurity.*

You’ve heard that nation-state hackers stole 145 million consumer records in the 2017 Equifax breach. Did you know that this attack and breaches at Amazon, Facebook, T-Mobile, and the Black Hat security conference all targeted vulnerable APIs?

Thanks to APIs, your consumers, employees, and partners benefit from robust applications with rich features. But, cyberthugs profit too, because they can leverage APIs and their flaws to get to your data.

Thousands of new APIs become available each year on alone. The global cloud API market will generate more than $1.7 billion in revenues by 2026, according to Persistence Market Research. With organizations like yours creating and using more APIs each year, the attack surface grows ever broader. Any solution must surround and secure your APIs, apps, and data despite the burgeoning landscape.

Read More

Topics: Web, Application & Hybrid Cloud Security, Threat Intelligence

Using Next-Gen WAFs to Solve Modern AppSec Problems

Posted by Mackenzie Jacobson on Feb 7, 2019 1:40:59 PM

Application security is undergoing a broad transformation - from the way applications are architected, developed, and deployed to the ever-evolving diversity and scale of the threats they face. Driving this transformation is the growing complexity of application portfolios, which are providing more engaging experiences for customers but are also housing increasingly more data. Often, this is accomplished through Application Programming Interfaces (APIs), which can be both external-facing, as well as connected on back-end systems. In addition, applications are becoming more modular or are broken into microservices.

As a result, legacy, rules-based web application firewalls (WAFs) like F5 and Imperva Incapsula are not equipped to keep pace with today's dynamic application and threat environments. These tools are increasingly unable to keep up with sophisticated, high-impact threats. Security teams need the right tools and strategies built for these new realities. Enter, the next-gen WAF.

Read More

Topics: Web, Application & Hybrid Cloud Security

ThreatX Labs - Blog

Arm yourself with information and insights on the latest cybersecurity trends to defend against today's most advanced cyber criminals with articles from the leader in SaaS-based web application firewall solutions.

Subscribe Here!

Recent Posts

Follow Me