Traceable

Foundations

OWASP API Security Top 10 List 2023 Refresh

OWASP API Security Top 10 List 2023 Refresh

API-Security
Company
Foundations
News
Releases

June 8, 2023

Sensitive Data Exfiltration: The New Nemesis of API Security

Sensitive Data Exfiltration: The New Nemesis of API Security

API-Security
Foundations

February 14, 2023

How API Abuse Became the Top Vector  for Data Breaches

How API Abuse Became the Top Vector for Data Breaches

API-Security
Breach Analysis
Foundations

January 18, 2023

The Business Case for API Security: Why API Security? Why Now?

The Business Case for API Security: Why API Security? Why Now?

API-Security
Breach Analysis
Foundations
Technology

December 2, 2022

Sensitive Data Leakage: Defined and Explained

Sensitive Data Leakage: Defined and Explained

API-Security
Cloud Native
Foundations

November 28, 2022

OWASP API Top 10 for Dummies: Part III

OWASP API Top 10 for Dummies: Part III

API-Security
Foundations

November 28, 2022

Cloud DLP: What It Is and Why It's Needed

Cloud DLP: What It Is and Why It's Needed

API-Security
Foundations

November 29, 2022

Black Friday Cybersecurity: Top 5 Insights from Traceable Chief Security Officer

Black Friday Cybersecurity: Top 5 Insights from Traceable Chief Security Officer

API-Security
Cloud Native
Foundations

November 17, 2022

API Abuse: Types, Causes, and How to Defend Against Them

API Abuse: Types, Causes, and How to Defend Against Them

API-Security
Foundations

November 7, 2022