Traceable

API-Security

OWASP API Security Top 10 List 2023 Refresh

OWASP API Security Top 10 List 2023 Refresh

API-Security
Company
Foundations
News
Releases

June 8, 2023

Sensitive Data Exfiltration: The New Nemesis of API Security

Sensitive Data Exfiltration: The New Nemesis of API Security

API-Security
Foundations

February 14, 2023

Traceable API Security Platform Update: End of 2022

Traceable API Security Platform Update: End of 2022

API-Security
Company
News
Releases

February 7, 2023

OWASP API Security Top 10 2023 RC Published

OWASP API Security Top 10 2023 RC Published

API-Security
News

February 14, 2023

Cybersecurity Roundup for January 2023: API Attacks Front and Center

Cybersecurity Roundup for January 2023: API Attacks Front and Center

API-Security
Breach Analysis
News

January 31, 2023

T-Mobile's API Data Breach: The API Security Reckoning is Here

T-Mobile's API Data Breach: The API Security Reckoning is Here

API-Security
Breach Analysis

January 22, 2023

How API Abuse Became the Top Vector  for Data Breaches

How API Abuse Became the Top Vector for Data Breaches

API-Security
Breach Analysis
Foundations

January 18, 2023

The CircleCI Data Breach: The TLDR

The CircleCI Data Breach: The TLDR

API-Security

January 9, 2023

Shadow APIs: The New Form of Shadow IT

Shadow APIs: The New Form of Shadow IT

API-Security
Cloud Native

January 4, 2023