Data Theorem
Serverless, shadow APIs and Denial of Wallet attacks
In this Help Net Security podcast, Doug Dooley, Chief Operating Officer at Data Theorem, discusses serverless computing, a new area that both DevOps leaders and enterprise …
Bring visibility to shadow APIs and ensure that security standards are being met
Last week Data Theorem introduced the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s …
New infosec products of the week: October 26, 2018
Data Theorem introduces automated API discovery and security inspection solution Data Theorem introduced the industry’s first automated API discovery and security inspection …
Data Theorem introduces automated API discovery and security inspection solution
Data Theorem introduced today the industry’s first automated API discovery and security inspection solution aimed at addressing API security threats introduced by today’s …
Who’s trying to eavesdrop on your customers’ encrypted mobile traffic?
The number one source of TLS/SSL Man in the Middle (MitM) attacks on encrypted mobile traffic are not corporate firewalls or captive portals used by hotels, airports and other …
New infosec products of the week: July 27, 2018
SentinelOne announces general availability of Central Park console SentinelOne announced the general release of Central Park, a console update enhancing its protection …
Data Theorem’s TLS pinning protects data from eavesdropping
Data Theorem announced that mobile applications equipped with TrustKit, Data Theorem’s Transport Layer Security (TLS) pinning library, protect the transmission of data. The …