Traceable Microsite
Grafana Labs Makes Observability More Accessible
The updates promise to make it easier to invoke the capabilities of a Grafana Cloud platform based on open source software ...
Securing Open-Source Apps
Securing Open-Source Apps with API Scans and Observability Businesses building applications have always made great use of open-source software. The move to cloud-native applications, use of low code development, and embracement of ...
Cloud Security Requires Shared Responsibility
The Growth of Public Cloud and the Need for Cloud Security Since 2006 when Amazon first introduced EC2 — the first public cloud service — cloud has become a major staple of ...
Securing Microservices Vs. Monolithic Apps
New requirements for Securing Microservices Vs. Monolithic Apps Enterprises are migrating from monolithic applications to microservices, hoping to accelerate software deployment and improve scalability. Security is sometimes glossed over in these transitions ...
Dependencies in Cloud-Native Apps can Amplify Risks
Hidden Dependencies in Cloud-Native Apps can Amplify Security Risks Cloud-native applications and modern development practices result in applications that are highly distributed and loosely coupled. In many cases, organizations have no control ...
The Shopify Breach: Why Authz Exploits Slip by Most Security Defenses
What Happened As part of a bug bounty, the security researcher Uzsunny found a critical vulnerability on the Shopify platform. The vulnerability allowed the attacker to assign himself as a “collaborator” to ...
Why Was Facebook Vulnerable to an Authentication Exploit?
What Happened: As part of a bug bounty program, the AppSecure cybersecurity research team found a vulnerability on the authentication mechanism of Facebook. It gave them the ability to potentially gain full ...
The Uber API Authorization Vulnerability
What Happened In September 2019, a critical bug was discovered on Uber API, which allows merchants, service providers and others to offer ride-sharing services to customers. Uber had exposed a vulnerable application programming interface ...
Web Application Firewalls Aren’t Protecting Cloud-Native Apps
Your web application firewall (WAF) is humming at the edges of your network, faithfully blocking malicious attacks before they can do any harm. Better yet, it’s a next-generation WAF (NG-WAF). It consists ...
The New Norm for Modern Apps: Security Observability
Observability has burst onto the scene across all types of operational and security-focused activities. Its need is being driven by increased demands for businesses to be more responsive to changes and more ...
TraceAI : Machine Learning Driven App and API Security
API security Modern applications are mobile first and are built around cloud-native distributed microservices architectures. These architectures have become the basic building blocks for complex and reliable distributed web and mobile applications ...
Safeguarding Composable Architecture Applications Based on API-enabled Components
The use of composable methodologies for application development is growing rapidly. The reason: It offers many benefits that speed the development process and opens up application creation to developers of all skill ...