API security has been a growing concern for years. However, while it was always seen as important, it often came second to application security or hardening infrastructure.  In 2025, the picture ...
Application programming interfaces (APIs) form the connective tissue in our digital world. Ensuring their security is a top priority for organizations. But in today’s fragmented digital environments, ...
The shadow technology problem is getting worse.  Over the past few years, organizations have scaled microservices, ...
The proliferation of artificial intelligence tools to reshape enterprise operations has created a parallel security challenge: The surge in application programming interface traffic driven by AI ...
Rest Assured “VentiAPI”, by Master of Information and Cybersecurity grads Karl-Johan Westhoff, Bleu Strong, Jenny Garcia, and Tyler Heslop, helps organizations find and fix vulnerabilities in their ...
First unified, single-pane-of-glass platform to deliver real-time detection and mitigation of API threats, including Broken Object Level Authorization (BOLA) and other advanced business logic threats ...
Radware has released its 2025 Cyber Survey, highlighting significant gaps in application security as organizations struggle to keep pace with evolving cyber threats, particularly those involving AI ...
Application programming interface security company Salt Security Inc. today announced the launch of “Ask Pepper AI,” a new generative artificial intelligence-powered natural language interface for its ...
Acquisition adds API security testing to Radware’s comprehensive API security portfolio, extending protection to all stages of the API lifecycleMAHWAH, N.J., Jan. 26, 2026 (GLOBE NEWSWIRE) -- Radware® ...
MAHWAH, N.J., Jan. 20, 2026 (GLOBE NEWSWIRE) -- Radware (RDWR) ® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced the launch ...
Major cybersecurity incidents are rarely the result of any single catastrophic failure. They are generally a result of attackers exploiting subtle weaknesses embedded deep within the systems. In ...