Cequence Product Integrations – Broadcom Layer7 API Gateway
April 16, 2024
Today, we’ll spend some time talking about integrating Cequence solutions with the Broadcom Layer7 API Gateway. Broadcom API Gateway, previously...
Continue Reading
What Are iframe Injection Attacks and How Do They Work?
April 11, 2024
Imagine your financial institution sends you an email that says you need to check something related to your account and...
Continue Reading
OWASP Top 10 Lists: End State or Starting Point?
April 09, 2024
Made popular by television talk-show host David Letterman, an avid application security enthusiast and obsessive list maker, top 10 security...
Continue Reading
Subscribe for more content and never miss an update!
Join Cequence Security at RSA Conference 2024: Protect What Connects You with Advanced API Security Solutions
April 08, 2024
Cequence Security is thrilled to announce our participation at this year’s RSA Conference, Booth 2033, where we'll showcase our innovative...
Continue Reading
What is API Security Testing?
April 04, 2024
In short, API security testing involves the systematic assessment of APIs to identify vulnerabilities, coding errors, and other weaknesses that...
Continue Reading
Comprehensive Application and API Protection with Cequence and Vercara
April 02, 2024
In January of this year, Cequence announced our partnership with Vercara, a leading provider of cloud-based security services. The partnership...
Continue Reading
Cequence Named to the Citizens JMP Cyber 66 List
March 28, 2024
Citizens JMP, a prestigious investment firm specializing in technology sectors, recently honored Cequence by recognizing us as one of the...
Continue Reading
How Hackers Can Use ChatGPT to Launch Automated Attacks
March 21, 2024
Basic API Interrogation During my time here at Cequence, I have been impressed with the attackers we face. Often, they...
Continue Reading
What is API Threat Detection?
March 19, 2024
API threat detection is one of the critical aspects of API security and is the process of identifying API threats...
Continue Reading