I’m delighted to be announcing that I’ve joined Imperva as the CTO for Application Security. Many of you readers know me as the Forrester analyst covering Zero Trust, SASE, and network security since before the pandemic. But what you might…
Category: Blog
5 Reasons Why You Need API Discovery
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: 5 Reasons Why You Need API Discovery
How to Implement Zero Trust on a Budget
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: How to Implement Zero Trust on a Budget
Best Practices to Help Meet PCI DSS v4.0 API Security Compliance
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Best Practices to Help Meet PCI DSS v4.0 API Security Compliance
Inside the NIST Cybersecurity Framework 2.0 and API Security
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Inside the NIST Cybersecurity Framework 2.0 and API Security
Akamai Named a Leader in The Forrester Wave?: Microsegmentation Solutions, Q3 2024
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Akamai Named a Leader in The Forrester Wave?: Microsegmentation Solutions, Q3 2024
Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day
How Securing APIs Factors into DORA Compliance
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Blog Read the original article: How Securing APIs Factors into DORA Compliance
Embed API Security into Regulatory Compliance: Six Examples to Watch
Read about how to meet API-related requirements in six key regulations and frameworks to better protect your organization. This article has been indexed from Blog Read the original article: Embed API Security into Regulatory Compliance: Six Examples to Watch
Agentless is a DAM Better Option for Securing Cloud Data
When it comes to on-premises database activity monitoring (DAM), security teams have consistently relied on agents to seamlessly track all incoming requests and outgoing responses within the databases. The agent-based approach effectively ensures independent monitoring of database activity, regardless of…