Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Introducing the Noname API Security Workshop

Have you ever wanted to learn how to protect your environment against API attacks? Well look no further! Noname Security just launched our new API Security Workshop to give technology professionals an interactive and hands-on learning experience. We've also partnered with ISC(2), the leading association for information security leaders like you, to offer 4 CPE credits for attending the workshop.

Deliver Secure APIs with Active Testing

True to a shift-left approach, Noname Security bakes API security testing into each step of the DevOps process, ensuring developers can monitor for vulnerabilities throughout the lifecycle. Discover how the Noname API Security Platform provides a suite of over 100 dynamic tests that simulate malicious traffic, including the OWASP API Top 10.

Block API Attacks in Real-time

Discover how Noname Security uses automated AI and ML-based detection to monitor API traffic in real-time and identify API vulnerabilities, including data leakage, data tampering, data policy violations, suspicious behavior, and API security attacks. See how you can remediate threats manually, semi-automatically, or fully automatically through integrations into WAFs, API gateways, SIEMs, ITSMs, and existing workflow tools.

Protect Your Applications from Hackers with API Security

According to Gartner, “traditional network and web protection tools do not protect against all the security threats facing APIs, including many of those described in the OWASP API Security Top 10.” In order to keep your organization safe from cybercriminals, you need to learn about, and invest in, robust API security tools. Noname Security is an industry-leading organization that will help your organization get prepared.

Layers of API Security and Log4j:Beyond the OWASP Top 10

Matt Tesauro of Noname Security talks about “Beyond the OWASP Top 10” and relates it back to mitigating the Log4j zero-day vulnerability. In this video interview with Information Security Media Group, Tesauro discusses: OWASP #11 and beyond, gaps exposed by Log4j, and how enterprises can address these issues via discovery, detection and response.