Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISO Workshop on API Threat Modeling: How to Use STRIDE to Predict, Prevent, and Protect

Threat modeling is a critical function for effective cybersecurity and threat models must adapt to emerging threats. As API deployments grow across organizations, cybersecurity teams need to extend their threat modeling to include the API attack surface. In this webinar, we'll examine threat modeling best practices for APIs, focusing on the STRIDE methodology. Attendees will learn.

How Salt Security & AWS Simplify API Security

See your Blind Spots in Minutes, not Months: How Salt Security & AWS Simplify API Security AI agents and cloud-native architectures have unleashed a wave of APIs and with them, new attack surfaces. Most security teams are struggling to keep up, especially in dynamic AWS environments where shadow and zombie APIs can easily go undetected. This Salt Security and AWS webinar explores a better approach to API discovery and security in AWS without the burden of in-line traffic collection or sensor deployments.

When Al Agents go Rogue: What you're Missing in your MCP Security

No Fluff, Just Real-World Threats This isn’t your typical marketing webinar. We cover what Agentic AI actually looks like in production, how MCP servers work to broker instructions, and what kind of new threats are emerging. Agentic AI isn’t coming. It’s already here. Autonomous agents are now operating in production environments, reasoning, remembering, and taking real actions across your systems. They’re not just generating content. They’re triggering workflows, modifying records, and making decisions. And they’re doing it over APIs.

Securing Agentic AI: Visibility and Protection for MCP Servers and A2A Traffic

AI agents aren’t just talking, they’re taking actions. They’re booking transactions, pulling sensitive data, and chaining tools together to get work done. As enterprises embrace these agents, protocols like the Model Context Protocol (MCP) and Agent-to-Agent (A2A) are enabling powerful new capabilities, but also creating invisible ecosystems of API-driven agent activity that traditional security tools can’t see or control.

You Can't Have AI Security Without API Security

For most leadership teams, the question is no longer if they’ll use AI, but how to turn it into measurable business value. Success hinges on the APIs that feed, govern, and scale AI initiatives — and whether your strategy is built for speed, security, and cost efficiency. From accelerating product development to delivering real-time customer experiences, the business case for AI is clear. But without the right API strategy, AI initiatives risk falling short — driving up costs, creating compliance gaps, and limiting ROI.

The Business Logic Paradox: Hackers Are Your Best Architects #businesslogic #cybersecurity #api

Here is the truth: To exploit Business Logic Abuse, hackers must understand your application flow holistically. Your individual developers focus on clean code within their one block. The attacker studies the entire blueprint and finds the gaps and missing connections between those blocks. They are committed-spending months on reconnaissance to know your product better than your own team. You must adopt the attacker's mindset in your design stages!

The CISO's Al Dilemma: How Security Leaders Are Making or Breaking Their Company's Future

AI agents are transforming how leading companies operate, delivering 24/7 customer service, processing thousands of transactions, and driving unprecedented operational efficiency. 53% of organizations are already deploying AI agents for customer-facing tasks, with market leaders running hundreds or thousands of agents to gain a competitive advantage. These agents handle sensitive data, trigger transactions, and make autonomous decisions at machine speed. But the APIs that power them are becoming a vast, overlooked attack surface.

Update on React Server Components RCE Vulnerability (CVE-2025-55182 / CVE-2025-66478)

The attack landscape has been dynamic following the disclosure of the React Server Components RCE vulnerability. New information has emerged regarding the initial Proof-of-Concept exploit, as well as improved detection methods, exploitation mechanics observed in the wild, and rapidly growing attack activity. This update summarizes the changes and observations we have made across Wallarm customers.

Agentic AI Security: The Emerging Fourth Pillar of Cybersecurity

For decades, cybersecurity has been organized around three dominant pillars: endpoint security, network security, and cloud security. These domains have shaped technology categories, vendor ecosystems, and enterprise budgets. They have matured into multi-billion-dollar markets, each responding to successive waves of digital transformation. However, a tectonic shift is underway.