
Will Glazier
Articles
-
Nov 12, 2024 |
securityboulevard.com | Will Glazier
Credit card fraud is an ongoing challenge for companies across industries, particularly in today's digital landscape where automated bot attacks are becoming increasingly prevalent. Cequence recently assisted a prominent customer in mitigating a sophisticated attack that involved testing stolen credit cards. Attackers used bots to perform small transactions to validate stolen credit cards, aiming to identify cards that were active so that they could be used for larger fraudulent purchases.
-
Sep 5, 2024 |
securityboulevard.com | Will Glazier
Cequence recently protected multiple major telecommunications companies, each a global leader with over 100 million customers, from a series of six high-profile Broken Object Level Authorization (BOLA) API attacks. Most of these companies use Google's Apigee API Gateway and rely on Cequence for advanced threat detection and prevention.
-
Sep 5, 2024 |
securityboulevard.com | Will Glazier
By Will Glazier Cequence recently protected multiple major telecommunications companies, each a global leader with over 100 million customers, from a series of six high-profile Broken Object Level Authorization (BOLA) API attacks. Most of these companies use Google's Apigee API Gateway and rely on Cequence for advanced threat detection and prevention. Cequence successfully ... Read More
-
Aug 14, 2024 |
msn.com | Will Glazier
Microsoft Cares About Your PrivacyMicrosoft and our third-party vendors use cookies to store and access information such as unique IDs to deliver, maintain and improve our services and ads. If you agree, MSN and Microsoft Bing will personalise the content and ads that you see. You can select ‘I Accept’ to consent to these uses or click on ‘Manage preferences’ to review your options and exercise your right to object to Legitimate Interest where used.
-
Aug 14, 2024 |
techradar.com | Will Glazier
Application Programming Interfaces (APIs) have long served as the invisible backbone of online retail. They empower retailers to seamlessly integrate the intricate web of ecommerce systems, orchestrating everything from payment processing to shipping logistics and inventory management. This interconnectedness, however, has also made the retail sector a lucrative target for threat actors.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →