WallarminWallarmWallarm connector to ApigeeIf you are a business undergoing a digital transformation, like Walgreens, Nike or Bechtel, heavy reliance on APIs is a key part of that…4 min read·Sep 28, 2019----
WallarminWallarmAutoscaling Wallarm Nodes in AWS, GCP, and AzureNewly updated Wallarm Node images now natively support autoscaling capabilities in AWS, GCP, and Azure. Updated images are already…3 min read·Sep 25, 2019----
WallarminWallarmDefining Wallarm API-specific RulesCase Study Using SugarCRM API As an Example5 min read·Jul 23, 2019----
WallarminWallarmUsing Threat Modeling in Cybersecurity to Hunt and RemediateModern-day cyberattacks keep growing in sophistication and sheer volume. This dynamic makes it virtually impossible to detect and block…11 min read·May 18, 2019----
WallarminWallarmLatest Bypassing Techniques Beats SOAP/XML API ProtectionMost security tools are not protecting data where it’s most vulnerable, inside the XML schema itself. How encoding attacks are beating us.4 min read·May 10, 2019----
WallarminWallarmIs your org structure threatening your IT security infrastructure?How API security is broken by siloed business logic and cross-functional communication problems10 min read·Apr 30, 2019----
WallarminWallarmWhat stealthy attacks are hiding in API data — and why do most WAF miss them?!Unicode JSON is a hotbed for possible hacker attacks. Hiding in plain view — and bypassing most WAF protections! Learn how to boost…4 min read·Apr 25, 2019----
WallarminWallarmMTGOX: Crypto Failure is in the Name.Takeaways from a $3.3B Cryptocurrency Exchange Breach10 min read·Apr 13, 2019----
WallarminWallarm8 Tips and Best Practices to Build a Solid Cloud Migration Strategy for 2019Contributed article by Gilad Maayan7 min read·Apr 5, 2019----