Pegasystems announced the general availability of Pega Infinity ’24.1™.
Data Theorem introduced API Attack Path Visualization capabilities for the protection of APIs and the software supply chain.
This latest enhancement of its API Secure solution empowers organizations with a comprehensive understanding of the attack chain, traversing all layers of an application, and extending protection to crucial underlying cloud assets including containers, storage, databases, and serverless functions.
Data Theorem’s API Secure now provides organizations with insight into potential vulnerabilities and their potential impact. These new full-stack visualization capabilities start with API exploits and expand to the broader perspective of how vulnerabilities impact mobile, web, serverless, and a variety of cloud-native applications.
Key features of API Secure’s new Attack Path Visualization capabilities include:
- Deeper Understanding: Gain a full-stack view from client to infrastructure layers of the attack chain, allowing for a more in-depth analysis of potential security risks and impact.
- Broader Coverage: Extend visibility beyond the API layer to encompass underlying cloud assets, ensuring a holistic understanding of the entire application ecosystem.
- Visual Clarity: Intuitive visualizations make complex attack paths easily digestible, enabling security teams to make informed decisions with speed and precision.
- Real-Time Monitoring: Keep abreast of dynamic threat landscapes with real-time monitoring, allowing for proactive observability and threat mitigation.
- Integration Capabilities: Seamlessly integrate API Attack Path Visualization into existing workflows, CI/CD tools, and traditional security tools like web application firewalls (WAF) for alerting and blocking to streamline and make efficient API protection practices.
“Data Theorem is committed to staying at the forefront of API security innovations, and our latest addition of the industry’s first API Attack Path Visualization for API Secure exemplifies this dedication,” said Doug Dooley, COO at Data Theorem. “By providing our customers with a holistic full-stack view of the attack surface, including underlying cloud assets, we empower them to proactively safeguard their cloud-centric applications against evolving threats like never before.”
Data Theorem’s latest version of API Secure with these new Attack Path Visualization enhancements is available now.
Industry News
Mend.io and Sysdig unveiled a joint solution to help developers, DevOps, and security teams accelerate secure software delivery from development to deployment.
GitLab announced new innovations in GitLab 17 to streamline how organizations build, test, secure, and deploy software.
Kobiton announced the beta release of mobile test management, a new feature within its test automation platform.
Gearset announced its new CI/CD solution, Long Term Projects in Pipelines.
Rafay Systems has extended the capabilities of its enterprise PaaS for modern infrastructure to support graphics processing unit- (GPU-) based workloads.
NodeScript, a free, low-code developer environment for workflow automation and API integration, is released by UBIO.
IBM announced IBM Test Accelerator for Z, a solution designed to revolutionize testing on IBM Z, a tool that expedites the shift-left approach, fostering smooth collaboration between z/OS developers and testers.
StreamNative launched Ursa, a Kafka-compatible data streaming engine built on top of lakehouse storage.
GitKraken acquired code health innovator, CodeSee.
ServiceNow introduced a new no‑code development studio and new automation capabilities to accelerate and scale digital transformation across the enterprise.
Security Innovation has added new skills assessments to its Base Camp training platform for software security training.
CAST introduced CAST Highlight Extensions Marketplace — an integrated marketplace for the software intelligence product where users can effortlessly browse and download a diverse range of extensions and plugins.
Red Hat and Elastic announced an expanded collaboration to deliver next-generation search experiences supporting retrieval augmented generation (RAG) patterns using Elasticsearch as a preferred vector database solution integrated on Red Hat OpenShift AI.
Traceable AI announced an Early Access Program for its new Generative AI API Security capabilities.