Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our work and the practices we’ve discussed in this blog series truly help ...
By Nicky Carlisle Distributed Denial of Service (DDoS) attacks are a growing concern for organizations of all sizes with the average number of attacks per day more than tripling since the end ...
Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our work and the practices we’ve discussed in this blog series truly help ...
Every few years, the Open Worldwide Application Security Project (OWASP) updates its top attack vectors. To illustrate how our work and the practices we’ve discussed in this blog series truly help ...
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their API security and security management. This post discusses the tooling and technology our ...
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their API security and security management. In our API gateway project, there are several architectural ...
This post shares experiences from our multi-year journey working with a Canadian client to help them improve their API security and security management. This post in the series discusses the approaches ...
One of our customers, a leader in the Canadian Telecom Market, found that the need for a single business innovation service gateway was inhibiting business and imposing unrealistic business costs. Their ...
Observability and Security are undoubtedly related. Security exposures and compromises happen in the dark, where no one is watching. An application with good Observability is inherently being watched, ...
By Leor Roynsky SPL (Splunk Processing Language) is the fundamental way through which users interact with data in their Splunk environment. While many of us use SPL on a regular basis, we often fail ...