Please turn on your JavaScript for this page to function normally.
network
Serverless, shadow APIs and Denial of Wallet attacks

In this Help Net Security podcast, Doug Dooley, Chief Operating Officer at Data Theorem, discusses serverless computing, a new area that both DevOps leaders and enterprise …

idea
Bring visibility to shadow APIs and ensure that security standards are being met

Last week Data Theorem introduced the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s …

Data Theorem API
New infosec products of the week​: October 26, 2018

Data Theorem introduces automated API discovery and security inspection solution Data Theorem introduced the industry’s first automated API discovery and security inspection …

Data Theorem API
Data Theorem introduces automated API discovery and security inspection solution

Data Theorem introduced today the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s …

quantum
Who’s trying to eavesdrop on your customers’ encrypted mobile traffic?

The number one source of TLS/SSL Man in the Middle (MitM) attacks on encrypted mobile traffic are not corporate firewalls or captive portals used by hotels, airports and other …

SentinelOne console
New infosec products of the week​: July 27, 2018

SentinelOne announces general availability of Central Park console SentinelOne announced the general release of Central Park, a console update enhancing its protection …

Data Theorem’s TLS pinning protects data from eavesdropping

Data Theorem announced that mobile applications equipped with TrustKit, Data Theorem’s Transport Layer Security (TLS) pinning library, protect the transmission of data. The …

Don't miss

Cybersecurity news