by Jessica Marie | Dec 2, 2022 | API Security, Blog, breach analysis, foundations, technology
The Business Case for API Security: Why API Security? Why Now? We are just about to finish yet another year — 2022. And in terms of cybersecurity and specifically, API Security, the past 12 months has been quite a challenge for many industries. As with any... by Jessica Marie | Dec 1, 2022 | API Security, Blog, cloud-native, customer story
NextRoll Gains 8x Visibility into APIs and Solves API Sprawl It’s time for another customer story from Traceable! Today’s blog highlights NextRoll’s journey to API Security, and specifically their struggle with API Sprawl and gaining visibility into... by Jessica Marie | Nov 29, 2022 | API Security, Blog, foundations
Cloud DLP: What It Is and Why It’s Needed The 21st century has moved data storage practices from traditional modes such as the use of hard drives to incorporate cloud-based methods. Cloud data storage involves storing data in a secure manner on the internet... by Jessica Marie | Nov 28, 2022 | API Security, Blog, cloud-native, foundations
Sensitive Data Leakage: Defined and Explained We live in a digital world where everything happens on the internet, from filling out important financial forms to online shopping. All such activities require you to fill in some sensitive data via the internet. As more... by Jessica Marie | Nov 28, 2022 | API Security, Blog, foundations
OWASP API Top 10 for Dummies: Part III Welcome back to our blog series on the OWASP API Top 10! This is continued from Part I and Part II. If you haven’t read the first two parts in this blog series, check them out! These blogs are written for a non-technical...