Digging Deep to Defend Against Docker API Abuse

  Another day, another API breach adds to the growing chorus against API vulnerabilities. The attack we speak about this time is targeting publicly exposed…

Read More

Cyber Security Cloud Survey 2019

Cyber Security & Cloud Expo Survey: Cloud Adoption Soars, but Security Struggles Cloud migration has become ubiquitous and most organizations are including API security in…

Read More

Advancing API Threat Protection

Fresh tracks from the next summit “The summit is what drives us, but the climb itself is what matters.” – Conrad Anker I have built…

Read More

CloudVector Launches API Threat Protection

CloudVector Advances State of API Threat Protection with Automated & Continuous Discovery ArecaBay rebrands as CloudVector, appoints Ravi Khatod CEO, gains $5M funding; CloudVector discovers,…

Read More

Time to Think Beyond Access: 3 Lessons from Capital One Data Breach

On July 19, 2019, Capital One determined that an outside individual gained unauthorized access and obtained certain types of personal information about Capital One credit…

Read More

Microservices Needs API Security, but API Security Should Not Depend on Microservices

APIs are the interconnect protocol in microservices architectures, and for this reason, API Security is an essential component of microservices security, besides, of course, the…

Read More

Advanced Microgateway Functions in a Service Mesh without Adding Gateways

A recent Gartner report (ID G00373257) defines elegantly a general Service Mesh architecture and how a set of microgateways are needed for East/West or lateral…

Read More

What Went Down At USPS Data Breach? Only CloudVector Could Have Prevented

A Data Exposure flaw at the United States Postal Service (USPS) website was disclosed last week by Brain Krebs from KrebsonSecurity. The flaw was identified…

Read More

A Case For Securing API Actions. What Words Of Wisdom Two Thousand Years Ago Can Teach Us About APP Security

Confucius taught us more than 2000 years ago: “Listen to his claims, but watch his actions.” Things are not what they claim to be. Such…

Read More

Toppling The App Jenga Tower – Pulling The API Parameter Piece

All of us have seen Jenga, Topple the Tower game. Today’s enterprise applications very much resemble the tower with a myriad of services and their…

Read More