Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The FTC Is Watching: GoDaddy's Settlement Sends a Clear Message on API Security

In today’s rapidly changing digital environment, APIs play a crucial role in modern business, facilitating smooth connectivity and data sharing. Yet, this interconnected nature brings significant security and privacy risks, as evidenced by the Federal Trade Commission's (FTC) recent settlement with GoDaddy. This settlement serves as a stark reminder that strong API security is no longer just a good security practice but is now a legal obligation.

How to Set Up a Headless CMS with a Custom Frontend Framework

In an increasinglydigital world, the demand for flexible, scalable and agile web experiences has never been higher. The company can use a headless CMS with their own frontend framework and use it to customize the web page to the maximum limit they want for the bestperformance and still owning the UI components which are more suitable and they are aiming to achieve.

Wallarm Research Releases Nuclei Template to Counter Threats Targeting LLM Apps

Wallarm Research has just released a powerful new Nuclei template targeting a new kind of exposure: the Model Context Protocol (MCP). This isn’t about legacy devtools or generic JSON-RPC pinging. It’s about the protocol fueling next-gen LLM applications — and it’s already showing up exposed in the wild.

AppSentinels: Fortifying Your Defenses with Business Logic Security

In today’s dynamic digital landscape, applications are the backbone of modern businesses. They drive operations, facilitate customer interactions, and manage critical data. However, the intricate web of rules and processes that govern these applications – the business logic – often presents a significant, yet frequently overlooked, attack surface.

Setting Up Astra's API Security with NGINX Ingress in Kubernetes

In this video, we’ll show you how to integrate Astra’s API Security Platform with your Kubernetes cluster using an NGINX Ingress controller. This setup allows Astra to passively observe live API traffic flowing through your ingress, enabling continuous vulnerability detection without interrupting your application. We'll cover.

How to Set Up Astra's API Traffic Collector in Kubernetes

In this step-by-step tutorial, we’ll walk you through setting up Astra’s API Traffic Collector inside a Kubernetes environment. This integration enables you to mirror live traffic to Astra's security engine—without impacting performance—so you can uncover vulnerabilities in real-time, without needing to configure test environments or rerun tests manually. You'll learn how to.

Meeting NIST API Security Guidelines with Wallarm

On March 25, 2025, NIST released the initial public draft of NIST SP 800-228, "Guidelines for API Protection for Cloud-Native Systems." The document provides a comprehensive framework for securing APIs in cloud-enabled environments. However, for organizations looking to align with these objectives, the tooling requirements may seem initially overwhelming. Fortunately, Wallarm helps streamline the process by integrating many of these recommendations into a single, cloud-native solution.