1.

The Dogecoin price is down by more than 10% today, and it looks like a continuation of the downtrend that started yesterday. 2. There are no signs of bullish momentum at this point, so we might see a ...

Continue Reading
The attackers are working around the clock, and so should you.

Attackers prefer to attack on weekdays during work hours (9:00 a.m.–5:00 p.m.) in order to blend into the crowd of regular traffic that occurs at those times. They also tend to avoid weekends when th ...

Continue Reading
API attack traffic has grown at triple the rate of overall API traffic, and 94% of survey respondents have experienced an API security incident

API attack traffic has grown at triple the rate of overall API traffic, and 94% of survey respondents have experienced an API security incident https://t.co/9RRaIY2hHX ...

Continue Reading
I’m going to be working on a new project, and I want your help.

I’ve been thinking about this for a while now, but the recent events with Patreon have really brought it into focus: It is time for me to start my own crowdfunding platform. A platform that will not ...

Continue Reading
The data makes it clear: more companies are suffering more API attacks than ever, and companies remain as ill-prepared as ever.

The Salt Labs team today released the latest edition of the pioneering “State of API Security” report. The data, drawn from a combination of survey responses and empirical data from Salt Security cu ...

Continue Reading
API Security Testing is a critical component of API testing.

It can be performed manually or automated using tools like Postman, SoapUI and others https://t.co/6h1u0L3hy9 ...

Continue Reading
API security is a top concern for organizations, but the tools and approaches used to address it are failing

API security is a top concern for organizations, but the tools and approaches used to address it are failing https://t.co/Eg46lu5tzq ...

Continue Reading
Don’t make the same mistake as these organizations.

3. Monitor API Traffic for Unauthorized Access Attempts and Suspicious Activity Just like you should monitor web traffic to detect malicious activity, you should also track API requests to identify s ...

Continue Reading

Back to Main

Subscribe for the latest news: