WallarminWallarmWallarm connector to ApigeeIf you are a business undergoing a digital transformation, like Walgreens, Nike or Bechtel, heavy reliance on APIs is a key part of that…Sep 28, 2019Sep 28, 2019
WallarminWallarmAutoscaling Wallarm Nodes in AWS, GCP, and AzureNewly updated Wallarm Node images now natively support autoscaling capabilities in AWS, GCP, and Azure. Updated images are already…Sep 25, 2019Sep 25, 2019
WallarminWallarmDefining Wallarm API-specific RulesCase Study Using SugarCRM API As an ExampleJul 23, 2019Jul 23, 2019
WallarminWallarmUsing Threat Modeling in Cybersecurity to Hunt and RemediateModern-day cyberattacks keep growing in sophistication and sheer volume. This dynamic makes it virtually impossible to detect and block…May 18, 2019May 18, 2019
WallarminWallarmLatest Bypassing Techniques Beats SOAP/XML API ProtectionMost security tools are not protecting data where it’s most vulnerable, inside the XML schema itself. How encoding attacks are beating us.May 10, 2019May 10, 2019
WallarminWallarmIs your org structure threatening your IT security infrastructure?How API security is broken by siloed business logic and cross-functional communication problemsApr 30, 2019Apr 30, 2019
WallarminWallarmWhat stealthy attacks are hiding in API data — and why do most WAF miss them?!Unicode JSON is a hotbed for possible hacker attacks. Hiding in plain view — and bypassing most WAF protections! Learn how to boost…Apr 25, 2019Apr 25, 2019
WallarminWallarmMTGOX: Crypto Failure is in the Name.Takeaways from a $3.3B Cryptocurrency Exchange BreachApr 13, 2019Apr 13, 2019
WallarminWallarm8 Tips and Best Practices to Build a Solid Cloud Migration Strategy for 2019Contributed article by Gilad MaayanApr 5, 2019Apr 5, 2019