InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Exploring the top threats and vulnerabilities facing modern APIs and AppSec

Presented by

Joshua Burgin, Chief Product Officer, Upwind | Michelle Drolet, CEO, Towerwall

About this talk

APIs and modern applications move fast—and so do today’s attackers. From broken authentication to data exposure, AppSec threats often hide in plain sight, undetected by legacy scanners and static policies. That’s where Cloud Application Detection & Response (CADR) comes in: surfacing live, contextual signals that reveal—and respond to—what’s actively exploitable, not just what once was. During this session, you’ll join Upwind CPO Joshua Burgin for a behind-the-scenes look at how CADR is redefining API and AppSec security. You’ll see what’s changing, what’s not working, and how to stay one step ahead of runtime threats. You’ll also learn how to: • Expose hidden risks in your APIs and apps using runtime data • Prioritize real threats with real-time, in-context visibility • Automate protection with enforcement that scales to your cloud • And more Watch now to learn how you can confidently secure your cloud apps.
Towerwall

Towerwall

2199 subscribers46 talks
Information Security
Towerwall is a woman-owned information security company offering a comprehensive suite of security services and solutions using best-of-breed tools and information security services. Our time-tested methodologies provide a consistent, repeatable, and measurable approach to information security; ranging from auditing and profiling to design and implementation. Towerwall’s 4E methodology, Evaluate Establish Educate Enforce, is time-tested, and provides a consistent, repeatable, and measurable approach to information security.
Related topics