Think you know what to expect from a conference booth? Think again. Forget the cliches: the swag destined for the back of your wardrobe, the formula one simulators, the marketing trickery. Instead, step into a new kind of conference experience, one that takes you on a journey through past, present, and future of cybersecurity. Step into Wallarm’s Cyber Security Museum. Why a Museum? Wallarm’s booth wasn’t just about showing products; it was about curating history. …
I recently sat down with Tejpal Garwhal, Application Security and DevSecOps Leader, for a conversation debunking some of the most…
On July 19, 2025, a critical remote code execution (RCE) vulnerability (CVE-2025-53770, also referred to as ToolShell) was publicly disclosed,…
Andrew Storms, VP of Security at Replicated, has spent three decades on the frontlines of cybersecurity. From building Unix systems…
Every inline deployment introduces a tradeoff: enhanced inspection versus increased risk of downtime. Inline protection is important, especially for APIs,…
Legislative, regulatory, and advisory bodies the world over are waking up to the importance of API security. Most recently, the…
AI has officially moved out of the novelty phase. What began with people messing around with LLM-powered GenAI tools for…
The US government has taken another significant step towards strengthening cloud security with the release of CISA’s Binding Operational Directive…
AI has had dramatic impacts on almost every facet of every industry. API security is no exception. Up until recently,…
Many tech professionals see integrating large language models (LLMs) as a simple process -just connect an API and let it…
