ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Traceable

  • Everything You Need to Know About Authentication and Authorization in Web APIs - Part 1

    Securing APIs is vastly different than securing applications – which means that your approach to authenticate and authorize users across your apps won’t work with web APIs. Read this article to learn everything you need to know about authentication and authorization in Web APIs.

  • WAF Versus NGWAF: How They Evolved and Where They Still Fall Short

    WAFs have made it safe to allow companies to connect more critical services, data and applications by filtering traffic. Today, next-gen WAFs have evolved to include advanced features and provide even greater detection. Download this resource to explore the evolution of WAFs and the rise of NGWAFs.

  • How To Avoid Exposing Private Data By Securing APIs

    APIs keep us conveniently connected on a daily basis, but they do come with one fundamental flaw: There is no standard way to develop APIs that can ensure security on a specific level, which puts data at risk. But by understanding the big picture behind API transactions, you can protect APIs holistically. View this white paper to learn more.

  • The Prescription for Vulnerable Mobile Health Apps: Protect APIs

    API attacks are on a steep rise. In fact, Gartner predicts that “by 2022, API abuses will move from an infrequent to the most-frequent attack vector, resulting in data breaches for enterprise web applications.” It’s time to learn how to protect your APIs. Get started here.

  • How RASP Has Transformed App Security. What’s Next?

    In response to the limitations of traditional application security (AppSec) technologies and capabilities, organizations have begun embracing the benefits of Runtime Application Security-Protection (RASP) tools. But what is RASP, and how is it better than existing AppSec tools? Read this article to find out.

  • The Consequences of Poor Authentication and Authorization Practices in APIs

    In this article, uncover examples of real-world API vulnerabilities (Shopify and Facebook) to understand how attackers could breach your defenses. And uncover what to look for when designing and building your authentication (authN) and authorization (authZ) system.

  • API Security Challenges: How to Manage APIs Amidst Continuous Change

    In this article, explore what API security and management for an always-on world looks like, which trends are in the works, and what technologies and strategies are keeping developers one step ahead. Click here to read the full article.

  • 3 Threat Vectors Addressed by Zero Trust App Sec

    Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.

  • Protecting Against the Hidden Threats of New Technologies

    Software development is being revolutionized by tools like GraphQL, but these new technologies also bring unknown security risks with them. Read this Traceable post to learn some of the biggest challenges facing modern application security, the shortcomings of legacy security, and strategies and solutions tackling this new wave of problems.

  • Security Observability: Why Tracing?

    Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.

  • Traceable Enables Security To Keep Up With Engineering And The Continuous Pace Of Change

    Learn how Traceable applies the power of machine learning and application observability to understand the DNA of an application, how it's changing, and where there are anomalies in order to detect and block threats.

  • Why Web App Firewalls Aren’t Protecting Your Cloud-Native Apps

    Take a look at what NG-WAFs do well, what they struggle with, and whether a solution makes up for their gaps.

  • Modern Application Security and Supply Chain Attacks – 3 Challenges

    In the wake of the recent SolarWinds breach, The OWASP API project set out to better understand the evolving API attack surface and highlight the 10 most critical API vulnerabilities. Read this article for a closer look at 3 of these API threats; microservice proliferation, application change, and porous perimeters.

  • API and Modern Application Security

    Over the past 15 years, there has been a global movement towards cloud-native business application architectures – which necessitated organizations to re-think how they protect their apps and APIs. Read this white paper to learn about the challenges and opportunities involved in transitioning from traditional to modern app and API security.

  • API Security & the OWASP API Top 10

    The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.

  • What AI can do for API Security

    Join security and DevOps experts as they discuss how TraceAI from Traceable uses machine learning for cloud-native application security.

  • A Better Way to Secure Your Apps and APIs

    Get an introduction to Traceable's application security platform for cloud-native applications and APIs. In this video, you’ll learn about the application security market from the perspectives of Greg Phillips, Traceable customer and CTO at Houwzer and Traceable advisors Andreas Wuchner (Credit Suisse) and Martin Rues (Outreach Corporation).

  • API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4

    Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.

  • Secure your GraphQL & gRPC APIs

    In this webinar, security experts discuss how optimal application and API architecture requires the use of new protocols. Tune in as they cover the use of Traceable for cloud-native application visibility, protecting external and internal APIs from OWASP Top 10 risks, and more.

  • What Runtime Application Self-Protection (RASP) Doesn’t Solve

    Tap into this article for RASP’s or Runtime Application Self-Protection’s, strengths and weaknesses in protecting against modern security threats.

  • Traceable Overview CTA Demo

    View this video overview of Traceable and how it uses security observability with artificial intelligence and machine learning to secure modern application architectures and their API's.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences