Traceable Microsite
What Runtime Application Self-Protection (RASP) Doesn’t Solve
RASP, or Runtime Application Self-Protection, is a modern security technology that protects web applications from attacks during runtime. The technology is an important complement to defense systems that focus on the perimeter, ...
Security Risks With No-Code/Low-Code Tools
As the popularity of no-code and low-code tools grows, so, too, do security concerns The demand for new applications is growing at a rapid rate. Many individuals and business units will not ...
Use the OWASP API Top 10 to Secure Your APIs
The tools, languages, platforms, and methods used to build applications have changed drastically over the past decade. Application security practices have to change with them; otherwise, security professionals will be playing constant ...
Why Businesses Need to Transform From DevOps to DevSecOps
The need for modern applications to support continuous integration, delivery and deployment spawned the need for DevOps. Increasingly, as cyberthreats evolve and grow and application development methods and time frames change, security ...
Security Observability: Why Tracing?
Detecting a cyberattack can take more than 200 days. During this time, attackers might be exploiting your system while you are completely unaware. Cyberattacks can cost affected organizations as much as $13 ...
Secure Kubernetes Architecture: Six Factors Essential to Success
Kubernetes has become the go-to container orchestration tool for businesses. Check out these telling stats [source: Enterpriser’s Project]: 84% of companies are using containers in production. Of those, 78% are using Kubernetes to ...
Web Application Security is not API Security
Do you follow the same procedures to secure a web application as you do an API? Is there a difference between the two? We’ve spoken about API security quite a bit in ...
Modern AppSec and Supply Chain Attacks – Three Challenges
The recent news about the SolarWinds breach has focused on the difficulty and challenges a supply chain attack presents. In the case of what Microsoft is calling “solorigate,” the attackers modified a dll deep ...
The Evolution to Cloud-Native Applications and APIs
If you’ve spent any length of time in application development, you’re familiar with change. It’s the only constant. And along with how we build applications come changes in the techniques used to ...