Using applications as an attack vector, in a DDoS campaign for example, is not new. But application abuse is evolving […]
Category: runtime security
Implementing runtime security for the cloud [Q&A]
Cloud-native platforms are built for speed with ephemeral workloads, rapid deployments, and plenty of third-party app dependencies. This poses a […]
