threatx_inc Profile Banner
ThreatX, Inc. Profile
ThreatX, Inc.

@threatx_inc

Followers
948
Following
180
Media
1K
Statuses
2K

Block attacks in real time with API and application protection you can trust 24/7 (without having to manage it yourself)

Boston MA/Denver CO
Joined March 2015
Don't wanna be here? Send us removal request.
@threatx_inc
ThreatX, Inc.
2 years
When conducting API discovery, consider, for each API: . • Public or private? .• External or internal? .• Who owns?.• What kind of calls can it make? .• Intended use case? .• How is it written? .• What kind of data is it transmitting? .
Tweet media one
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
Looking for less alert fatigue and more peace of mind in 2024?. Hear the story of a Canadian retail chain: #APISecurity #ApplicationSecurity #threatx
Tweet media one
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
Zero-day vulnerabilities are a huge challenge made more challenging by attackers quickly spinning up variants of these vulnerabilities. We walk you through a couple of these Log4j variants below. #APISecurity #ApplicationSecurity #runtime
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
After analyzing data from the ThreatX platform over a recent 3-month period, we found that the overall percentage of HTTP traffic that is API traffic is approximately 59.83 percent. And for some industries, the use of APIs is really exploding. #APISecurity
Tweet media one
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
The Leadership Bench Program Christine Gadsby developed at Blackberry is a great inspiration for anyone looking to develop talent and tackle big problems. #threatx #cybersecurity #CISO #informationsecurity #cybersecuritycareers #careerdevelopment
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
Is runtime protection for APIs and apps really necessary?. Security teams’ struggles with the log4j zero day suggest it is. Get details in this short video. #APISecurity #ApplicationSecurity #runtime
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
Is API security a 2024 priority? Does the board agree it should be a priority?. If you need to explain or make the case for API security to an exec audience this year, we’ve got a template for you: . #APIsecurity
Tweet media one
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
Happy New Year! . Here's to health, happiness, and secure APIs and apps in 2024!
Tweet media one
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
Clear and detailed visibility into attacker tactics and targets is a game-changer. With this data, planning and prioritizing become much more straightforward. Find out how a Canadian retail chain is benfitting from this level of detail: #APISecurity
Tweet media one
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
In our recent analysis of ThreatX Q3 platform data, we found that the banking industry stood out in a couple areas. #APISecurity #ApplicationSecurity #threatx. Get our full analysis of the state of API and app security in banking:
Tweet media one
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
API discovery is a huge challenge for most security teams. Where do you start, what does it entail, how do you explain the importance of this exercise? . Get security expert Maria Schwenger’s take below. Hear the full conversation: #APISecurity
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
Happy Holidays! We hope you are surrounded by friends and family and wish you all a fun, festive, and relaxing end to 2023.
Tweet media one
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
Why does a security culture matter when building an API security program? . Cybersecurity expert Maria Schwenger explains below. #APISecurity
0
0
1
@threatx_inc
ThreatX, Inc.
2 years
Alert fatigue, false positives, and fear of disrupting legit traffic are challenges faced by every security team we talk to. Our co-founder explains how we address these challenges below. #APISecurity #ApplicationSecurity #runtime #threatx
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
Are some industries more susceptible to bot attacks? . We recently analyzed the data collected on our API and Application Protection platform from August to October 2023. #APISecurity #ApplicationSecurity #threatx
Tweet media one
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
Lack of Resources and Rate Limiting on the 2019 OWASP API Top 10 Vulnerabilities list has become Unrestricted Resource Consumption in 2023. Learn more about this change and this vulnerability: #APISecurity #OWASP
Tweet media one
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
How do you ramp up API protection quickly? Cybersecurity expert Maria Schwenger shares her top tips for fast results below. #APISecurity
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
We analyzed data collected on the ThreatX API & App Protection platform from Aug through Oct 2023. 2 trends across industries:.✔️ The prevalence of bot attacks. ✔️ The popularity of cred stuffing attacks. #APISecurity #ApplicationSecurity #threatx
Tweet media one
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
In the clip below, ThreatX co-founder and chief product officer Bret Settle talks about how deploying a sidecar sensor within Kubernetes environments enables easy protection across a mixed-cloud infrastructure. #APISecurity #ApplicationSecurity #runtime
0
0
0
@threatx_inc
ThreatX, Inc.
2 years
Keeping up with cyberattackers is a big job, and technology alone is not enough. Find out how we are helping this team stop advanced attacks without exhausting their resources: #APISecurity #ApplicationSecurity
Tweet media one
0
0
1