Все публикации

An Insider's View: The Updated OWASP API Top 10

Mapping the MITRE ATT&CK Framework to API Security

How Protecting Your APIs Protects Your Bottom Line

Office Hours: Tapping Cloudflare for API Security

Salt: Securing your innovation video

SANS Protects Web Applications and Services

TechAdvice Webinar: API Security Best Practices

Customer Stories: Tyler Warren of Prologis

Customer Stories: Jack Hart of City National Bank

The Salt Journey to Series D

CapitalG on leading the Salt Series D round

“Anatomy of an API Attack: Elastic Injection”

“Anatomy of an API Attack: Broken Object Level Authorization”

“Anatomy of an API Attack: Credential stuffing and Account Takeover”

CISO Choice Awards Vendor Recognition - Salt Security

API Security Predictions for 2022

Office Hours: Dealing with the Log4Shell Vulnerability

API MythBusters Chalk Talk: IAM, Gateways, and WAFs

API MythBusters Chalk Talk: Shift-left Security

API MythBusters Chalk Talk: Cloud Security

API MythBusters Chalk Talk: Workload Protection

API MythBusters Chalk Talk: Zero Trust

Understanding API Attacks - What Is Credential Stuffing?

Understanding API Attacks - What Is Data Exfiltration?

join shbcf.ru