Radware Investor Day: Cloud Security Push, API Expansion and Agentic AI Protection Drive Growth Plan
Radware (NASDAQ:RDWR) used its Investor Day presentation to outline a growth strategy centered on cloud-delivered application ...
Research reveals 2,863 public Google API keys can access Gemini endpoints, enabling data exposure and massive billing abuse.
This marks the third straight year of increased incursions and marks an all-time high (up from 78% in 2023). Akamai Technologies, Inc. today announced new research showing that while API attacks are ...
API key exploitation is more than hypothetical. In a different context, a student who reportedly exposed a GCP API key on GitHub last June was left nursing a $55,444 bill (later waived by Google) ...
A quiet change in how Google’s cloud services interact has opened an unexpected security gap, putting thousands of ...
Google API keys for services like Maps embedded in accessible client-side code could be used to authenticate to the Gemini AI ...
With APIs powering much of our modern applications, protecting them is no longer optional; it’s a necessity. This blog explores how to seamlessly integrate advanced API security into your Imperva ...
MAHWAH, N.J., Jan. 20, 2026 (GLOBE NEWSWIRE) -- Radware (RDWR) ® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced the launch ...
Application programming interface security startup Cequence Security Inc. today announced new updates to its Unified API Protection Platform designed to strengthen customers’ ability to discover, ...
Content delivery network and cloud services provider Akamai Technologies Inc. today announced a new native connector between Akamai API Security and the Akamai Connected Cloud that simplifies the ...
PALO ALTO, Calif.--(BUSINESS WIRE)--Data Theorem, Inc., a leading provider of modern application security, today announced that it has been named as an Industry Leader in API Security and Management ...
Enterprise security isn’t easy. Small oversights around systems and vulnerabilities can result in data breaches that impact millions of users. Unfortunately, one of the most common oversights is in ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results