When “Secure by Design” Isn’t Enough: Enter API Runtime Posture Management Most teams believe they have a reasonable handle on their APIs. They know what’s exposed through the gateway. There’s documentation—at least for the important services. There are security controls in place. Maybe even testing in the pipeline. Uri Dorot |May 19, 2026
The OWASP IoT Top 10 and How to Defend Against It The OWASP IoT Top 10 is a security awareness document developed by the OWASP Foundation that identifies the most critical security risks associated with Internet of Things (IoT) devices and ecosystems. Jitesh Sharma |May 14, 2026
Neither Human Nor Bot: The AI-driven Traffic Problem For years, the fundamental question that web traffic management has been built around is a binary one: is this traffic human, or is it a bot? Dhanesh Ramachandran |May 07, 2026
Post-Quantum Cryptography: What C-Level Leaders Must Do Now—Before It Becomes a Crisis Quantum computing is no longer a distant threat - it is a board-level risk with a defined timeline. Governments across North America, Europe, and the UK are already directing organizations to begin transitioning to post-quantum cryptography (PQC), with full migration expected over the next decade. Prakash Sinha |May 01, 2026
AI Crawler Traffic Is Exploding: What Website Owners Must Do Now Right now, OpenAI, Apple, Meta, Anthropic, Amazon, and Perplexity are crawling your website. Not occasionally. Continuously. Anirudh K |April 22, 2026
The Secret to Hacking APIs Is Context Ask most security teams how well their APIs are protected, and they'll point to the scanner results. Green across the board. No critical findings. Compliance checked. Ofer Hakimi |April 07, 2026
Best Practices for managing Kubernetes environment in Web-DDoS attacked environments – Part2 Many organizations treat a traditional WAF as sufficient front-line protection—assuming it will block all web-based threats. In cloud-native environments (especially Kubernetes), however, WAF-only defenses increasingly fall short. Nithin Rudraswamy |April 01, 2026
Cloud, COVID, and AI: A New Phase of Rapid Adoption and Emerging Risk When the COVID 19 pandemic arrived, organizations had to support remote employees much sooner than expected. Migration plans that were scheduled across several years were compressed into a few weeks. Chris Vacek |March 27, 2026
Beyond Traditional Defenses: How Positive Protection Defeats Randomized HTTPS Flood Attacks The cybersecurity landscape has witnessed a dramatic evolution in DDoS attack sophistication, with threat actors deploying increasingly complex strategies to bypass traditional security measures. Boris Melnik |March 23, 2026
The Agentic Web Is Here — Are we ready for it? The Internet as we know it is seeing a massive change. Applications have sprinted from Web to APIs to be AI-powered - and are now transforming into being AI Agents & Autonomous AI Applications, meaning that the Web Economy is now transforming into an Agentic Economy. Karthik Raju |March 19, 2026
Why Agentic AI Is More Dangerous Than Traditional LLMs: Understanding Autonomy Risk Traditional LLMs generate text; Agentic AI generates consequences. The leap from predictive responses to autonomous action changes the risk equation dramatically. Dror Zelber |March 18, 2026
Understanding AI Agents - The Next Wave of Automated Internet Activity Artificial intelligence is reshaping not only what software can do, but how it operates across the internet. While in the recent past, AI’s most visible impact on web activity came in the form of AI crawlers that collected and indexed content at scale for model training, a more complex shift is underway. Dhanesh Ramachandran |March 17, 2026