{"dynListPages":{"/case-studies":true,"/product/deployment-options":true,"/product/security-testing":true,"/resources":true,"/solutions/kubernetes-api-security":true,"/solutions/wallarm-for-aws":true,"/solutions/wallarm-for-ecommerce":true,"/solutions/wallarm-for-financial-services":true,"/solutions/wallarm-for-gcp":true,"/solutions/wallarm-for-healthcare":true,"/solutions/wallarm-for-microsoft-azure":true,"/solutions/wallarm-for-saas":true,"/what":true,"/solutions/kong-api-security":true,"/product/wallarm-waap":true,"/product/advanced-api-security":true,"/product/api-threat-prevention":true,"/cloud-native-products-101":true,"/product/api-security-overview":true,"/product/api-security-platform":true,"/style-guide/draft-page":true,"/glossary":true,"/style-guide/main-page-option-2":true,"/style-guide/copy-products-integrated-app-and-api-security-platform":true,"/style-guide/report-products-integrated-app-and-api-security-platform":true,"/solutions/mulesoft-api-security":true,"/product/integrations":true,"/press-room":true,"/press-releases":true,"/company-news":true,"/product/api-attack-surface-management-product":true,"/whats-wallarm-learning-center-attacks":true,"/whats-wallarm-learning-center-owasp":true,"/whats-wallarm-learning-center-api-security-owasp":true,"/whats-wallarm-learning-center-vulnerabilities":true,"/whats-wallarm-learning-center-devsecops":true,"/whats-wallarm-learning-center-waf":true,"/whats-wallarm-learning-center-pentest":true,"/whats-wallarm-learning-center-api-security":true,"/company-events":true,"/product/security-edge-platform":true,"/product/protect-agentic-ai":true,"/whats-authors":true,"/product/security-edge":true,"/security-edge-request-demo-thank-you":true,"/company-industry-analysts":true,"/demo-sign-up-thank-you":true,"/q3-2025-api-threatstats-report-thank-you":true,"/securing-enterprise-apis-a-technical-guide-for-practitioners-thank-you":true,"/legacy-tools-cant-protect-modern-apis-thank-you":true,"/a-cisos-guide-to-api-security-thank-you":true,"/api-security-certification":true,"/search":true,"/content-download-thank-you/competitive-report":true,"/what/rss.xml":true},"detailPages":{"webinars":"/detail_webinars","resources":"/detail_resources","what":"/detail_what","cloud-native-products-101":"/detail_cloud-native-products-101","whats-authors":"/detail_whats-authors","document-types":"/detail_document-types","news":"/detail_news","press-releases":"/detail_press-releases","analyst-research":"/detail_analyst-research","slides-black-hat":"/detail_slides-black-hat"},"redirectDomain":"www.wallarm.com","onlySSL":true,"redirects":{"/how-it-works/videos/fast-overview":"/resources/wallarm-platform-demo-fast-overview","/cloud-natives-security-for-api":"/product/cloud-natives-security-for-api","/how-it-works/videos/api-deep-request-inspection":"/resources/wallarm-platform-demo-api-deep-request-inspection","/how-it-works/videos/configuring-wallarm-scanner":"/resources/wallarm-platform-demo-configuring-wallarm-scanner","/how-it-works/videos/events-types":"/resources/wallarm-platform-demo-events-types","/how-it-works/videos/dissecting-one-attack":"/resources/dissecting-one-attack-with-wallarm","/resources/mednet-customer-story":"/resources/mednet-case-study","/resources/covid-19-changing-the-way-we-work-in-infosec-world":"/webinars/covid-19-changing-the-way-we-work-in-infosec-world","/resources/modern-security-challenges-for-healthcare-organizations":"/webinars/modern-security-challenges-for-healthcare-organizations","/resources/replace-your-legacy-waf":"/webinars/replace-your-legacy-waf-2","/how-it-works":"/product/cloud-native-api-security","/files/Wallarm%20FAST%20quick%20evaluation%20guide.pdf":"https://docs.fast.wallarm.com/en/onboarding/onboarding.html","/whats-library":"/what","/api-security-learning-center":"/what","/what/two-factor-authentication-2fa-what-is-it-and-how-doe-it-work":"/what/two-factor-authentication-2fa-what-is-it-and-how-does-it-work","/solutions/healthcare":"/solutions/wallarm-for-healthcare","/products/videos/full-product-demo":"/resources/wallarm-platform-full-product-demo","/resources/what-is-wrong-with-dast":"/resources/whats-wrong-with-dast","/wallarm-node-release-2-12":"https://docs.wallarm.com/2.12/updating-migrating/what-is-new/","/resources/replace-your-legacy-waf-2":"/webinars/replace-your-legacy-waf-2","/what/what-is-web-api-security":"/what/api-security-tutorial","/what/what-are-kubernetes-operators":"/cloud-native-products-101/what-is-a-kubernetes-operator","/product/kong-deployment":"/solutions/kong-deployment","/docs/(.*)":"https://docs.wallarm.com/%1","/request-a-demo":"/request-demo","/how-it-works/videos/attacks-vs-incidents":"/resources/wallarm-waf-demo-attacks-vs-incidents","/how-it-works/videos/protecting-multiple-apps-in-multiple-clouds":"/resources/wallarm-demo-protecting-multiple-apps-in-multiple-clouds","/product/cloud-native-security-for-api":"/product/cloud-native-api-security","/files/Wallarm%20AI-Powered%20security.pdf":"/product/wallarm-cloud-native-platform-overview","/how-it-works/videos/integrating-wallarm-waf-into-existing-devops-toolchain":"/resources/wallarm-demo-integrating-wallarm-waf-into-existing-devops-toolchain","/resources/what-is-wrong-with-rasp":"/resources/whats-wrong-with-rasp","/ico":"/solutions/wallarm-for-financial-services","/files/Wallarm.%20Case%20studies.%20Trucker%20Path.pdf":"/resources/trucker-path-case-study","/fast?utm_campaign=FAST_LAUNCH&utm_medium=WEB&utm_source=SSRF_BIBLE&utm_term=&utm_content=":"/product/fast","/weekly-live-demo":"/regular-live-demo","/gotestwaf/wip-test-your-waf-before-hackers":"/gotestwaf/wip-getreport","/cloud-native-products-101/what-is-prometheus-monitorig-tool-guide-by-wallarm":"/cloud-native-products-101/what-is-prometheus-monitoring-tool-guide-by-wallarm","/wip-wallarm-dast":"/resources/whats-wrong-with-dast","/glossary-2":"/glossary","/imperva-vs-wallarm":"/wallarm-vs-imperva","/products/fast":"/product/fast","/how-it-works/videos/dashboard-functionality-overview":"/resources/wallarm-platform-demo-dashboard-functionality-overview","/resources/fintech-security-challenges":"/solutions/wallarm-for-financial-services","/product/wallarm-platform-overview":"/product/wallarm-cloud-native-platform-overview","/resources/semrush-customer-story":"/resources/semrush-case-study","/solutions/crypto-exchange-protection":"/solutions/wallarm-for-financial-services","/files/Wallarm.%20Application%20Security%20Platform%20Powered%20by%20AI.%20Datasheet.pdf":"/resources/wallarm-datasheet","/resources/modern-security-challenges-for-financial-organizations-2":"/webinars/modern-security-challenges-for-financial-organizations-2","/what/understanding-soar-security-orchestration-automation-response-and-its-importance":"/what/what-is-soar-security-orchestration-automation-response","/resources/aws":"/resources/securing-apps-on-aws-with-wallarm","/how-it-works/videos":"/resources?tab=videos","/how-it-works/videos/exploring-companys-attack-surface-with-wallarm-scanner":"/resources/wallarm-platform-demo-exploring-companys-attack-surface-with-wallarm-scanner","/resources/how-to-set-up-cloud-based-security-for-apis-and-apps":"/webinars/cloud-based-security-for-apps-and-apis-with-lumen","/terms-of-services":"/terms-of-service","/webinars-library":"/resources?tab=webinars","/resources/tipalti":"/resources/tipalti-case-study","/products/videos/attacks-vs-incidents":"/resources/wallarm-waf-demo-attacks-vs-incidents","/product/platform-overview":"/product/wallarm-cloud-native-platform-overview","/products/videos/redefining-cli-to-unify-security-and-devops":"https://www.youtube.com/watch?v=OqQH7-dJtX8&ab_channel=Wallarm","/landing-page":"/gotestwaf/overview","/files/Wallarm.%20Case%20studies.%20Semrush.pdf":"/resources/semrush-case-study","/healthcare":"/solutions/wallarm-for-healthcare","/how-it-works.html":"/product/wallarm-cloud-native-platform-overview","/rsa-2023":"/api-security-rsa-2023","/product/api-attach-surface-management-product":"/product/api-attack-surface-management-product","/files/resources/Wallarm%20AI%20Engine.pdf":"/resources/wallarm-ai-engine-how-it-works","/files/Wallarm%20Privacy%20FAQ.pdf":"/resources/privacy-faq","/resources/protecting-cloud-native-apps-and-apis-in-kubernetes-environments":"/webinars/protecting-cloud-native-apps-and-apis-in-kubernetes-environments","/resources/cloud-waf-webinar-feb-2021":"/webinars/cloud-based-security-for-apps-and-apis-with-lumen","/product/platform-overview-old":"/product/wallarm-cloud-native-platform-overview","/solutions":"/product/wallarm-cloud-native-platform-overview","/what/wardriving-what-is-it-complete-guide":"/what/what-is-wardriving-complete-guide","/resources/pci_compliance":"/resources/pci-compliance","/resources/rappi":"/resources/rappi-case-study","/product/cloud-natives-security-for-api":"/product/cloud-native-api-security","/solutions/waf-for-kubernetes":"/solutions/kubernetes-api-security-and-waf-waap","/webinars":"/resources?tab=webinars","/products/dast":"/product/fast","/files/Kubernetes-web-DS-12-01.pdf":"/resources/wallarm-for-kubernetes","/files/Wallarm%20FAST%20Datasheet.pdf":"/resources/wallarm-fast","/what/api-security-wiki":"/what/api-security-tutorial","/product/api-leak-management-early-release":"/product/api-leak-management","/products/videos/fast-demo-with-gitlab-ci":"/resources/wallarm-platform-demo-fast-overview","/products/ng-waf":"/product/cloud-native-api-security","/resources/5-components-for-startup-cybersecurity":"/webinars/5-components-for-startup-cybersecurity","/cryptocurrency-security":"/product/wallarm-cloud-native-platform-overview","/landing-page-form":"/gotestwaf/form","/solutions/by-cloud-mulesoft":"/solutions/wallarm-for-mulesoft","/profesional-information-security-services":"/professional-information-security-services","/what/20-must-have-tools-for-devops-in-2021":"/what/20-must-have-tools-for-devops","/what/best-anti-phishing-tool-in-2021":"/what/ best-anti-phishing-tool","/files/Wallarm%20FAST%20Press.pdf":"/product/fast","/whats":"/what","/partners-new":"/partners","/g2-grid-report":"/g2-wallarm-api-security","/solutions/kong-deployment":"/solutions/kong-api-security","/news":"/press-room","/resources/top-five-challenges-protect-api":"/resources/top-five-challenges-in-protecting-apis","/resources/xsolla-customer-story":"/resources/xsolla-case-study","/resources/cloud-security-from-infrastructure-to-applications":"/webinars/cloud-security-from-infrastructure-to-applications","/what/knowing-fido-or-fast-identity-online-better":"/what/what-is-fido-fast-identity-online","/end-to-end-api-security":"/product/api-security-overview","/product/cloud-waf":"/product/wallarm-waap","/product/api-abuse-prevention-early-release":"/product/api-abuse-prevention","/resources/evolution_of_detection":"/resources/evolution-of-real-time-attack-detection","/files/Wallarm.%20Case%20studies.%20MedNet.pdf":"/resources/mednet-case-study","/resources/how-to-check-your-waf-api-security-reliability":"/webinars/how-to-check-your-waf-api-security-reliability","/resources/modern-security-challenges-for-financial-organizations":"/webinars/modern-security-challenges-for-financial-organizations","/webinars/how-to-set-up-cloud-based-security-for-apis-and-apps":"/webinars/cloud-based-security-for-apps-and-apis-with-lumen","/product/cloud-native-api-security":"/what/api-security-tutorial","/product/advanced-api-security-for-modern-api-environments":"/product/advanced-api-security","/api-leak-management-early-release":"/product/api-leak-management-early-release","/resources/wallarm-api-protection-series-securing-graphql-api":"/webinars/wallarm-api-protection-series-securing-graphql-api","/backdoor":"/bdsearch","/company-2/company":"/company","/2023-october-q2-report":"/reports/2023-october-q2-report","/solutions/wallarm-for-mulesoft":"/solutions/mulesoft-api-security","/wallarm-vs-salt-vs-noname-copy":"/noname-vs-salt-vs-traceable-vs-wallarm","/resources/ai_engine":"/resources/wallarm-ai-engine-how-it-works","/resources/frost_sullivan":"/resources/frost-sullivan-research-global-web-application-firewall-waf-market-analysis","/resources/ciso-guide-cloud-application-security":"/resources/a-cisos-guide-to-cloud-application-security","/resources/uzleuven-customer-story":"/resources/uz-leuven-case-study","/files/Wallarm%20FAST%20Test%20policies.pdf":"docs.fast.wallarm.com/en/operations/test-policy/overview.html","/product/platform-overview-copy":"/product/wallarm-cloud-native-platform-overview","/demo":"/landing-materials/hubspot-forms-examples/demo","/und-user-license-agreement":"/end-user-license-agreement","/what/how-to-be-essential-eight-compliant-in-2023":"/what/how-to-be-essential-eight-compliant","/files/Wallarm%20with%20NGINX%20Plus.%20Datasheet.pdf":"/resources/wallarm-waf-for-nginx","/files/Wallarm%20ICO%20Datasheet.pdf":"/solutions/wallarm-for-financial-services","/products/advanced-cloud-native-waf":"/product/wallarm-cloud-native-platform-overview","/resources/top-10-security-challenges-for-retail-companies":"/webinars/top-10-security-challenges-for-retail-companies","/resources/top-10-security-challenges-for-european-retail-companies":"/webinars/top-10-security-challenges-for-retail-companies","/webinars/test-your-waf-protection-quality-before-hackers":"/webinars/api-threats-simulation-workshop","/style-guide/glossary-new":"/style-guide/glossary","/product/wallarm-cloud-native-platform-overview":"/product/api-security-overview","/owasp-global-appsec-dc-2023":"/events/owasp-global-appsec-dc-2023","/product/aasm-profiling-test":"/product/aasm-request-form","/product/advanced-api-security/1000":"/product/advanced-api-security","/what/broken-function-level-authorization/1000":"/what/broken-function-level-authorization","/product/api-security-platform/1000":"/product/api-security-platform","/webinars/practitioners-guide-2023-owasp-api-security/1000":"/webinars/practitioners-guide-2023-owasp-api-security","/resources/uz-leuven-case-study/1000":"/resources/uz-leuven-case-study","/what/what-is-the-insecure-direct-object-references-vulnerability/1000":"/what/what-is-the-insecure-direct-object-references-vulnerability","/what/what-is-iga-identity-governance-and-administration/1000":"/what/what-is-iga-identity-governance-and-administration","/what/managed-security-service-provider/1000":"/what/managed-security-service-provider","/resources/waf-and-api-protection-evaluation-checklist/1000":"/resources/waf-and-api-protection-evaluation-checklist","/what/forced-browsing-attack/1000":"/what/forced-browsing-attack","/what/what-is-sase-secure-access-service-edge/1000":"/what/what-is-sase-secure-access-service-edge","/what/what-is-iso-27001/1000":"/what/what-is-iso-27001","/what/what-is-yaml-definition-for-beginners/1000":"/what/what-is-yaml-definition-for-beginners","/what/principle-of-least-privilege-polp/1000":"/what/principle-of-least-privilege-polp","/what/what-is-identity-and-access-management/1000":"/what/what-is-identity-and-access-management","/what/cyber-extortion/1000":"/what/cyber-extortion","/webinars-library/1000":"/webinars-library","/product/cloud-waf/1000":"/product/cloud-waf","/cloud-native-products-101/what-is-jaeger/1000":"/cloud-native-products-101/what-is-jaeger","/cloud-native-products-101/what-is-etcd/1000":"/cloud-native-products-101/what-is-etcd","/cloud-native-products-101/what-is-harbor-what-is-it-for/1000":"/cloud-native-products-101/what-is-harbor-what-is-it-for","/what/a5-broken-access-control-2017-owasp/1000":"/what/a5-broken-access-control-2017-owasp","/what/software-development-kits/1000":"/what/software-development-kits","/what/what-is-a-container-registry/1000":"/what/what-is-a-container-registry","/what/what-is-transport-layer-security/1000":"/what/what-is-transport-layer-security","/what/malicious-code/1000":"/what/malicious-code","/what/the-concept-of-grpc/1000":"/what/the-concept-of-grpc","/what/what-is-the-oauth/1000":"/what/what-is-the-oauth","/what/the-concept-of-an-api-management/1000":"/what/the-concept-of-an-api-management","/what/what-is-xss-cross-site-scripting/1000":"/what/what-is-xss-cross-site-scripting","/what/waap-web-application-api-protection/1000":"/what/waap-web-application-api-protection","/what/bgp-routing-explanation/1000":"/what/bgp-routing-explanation","/what/common-types-of-endpoint-security/1000":"/what/common-types-of-endpoint-security","/what/advanced-persistent-threat-apt/1000":"/what/advanced-persistent-threat-apt","/what/a4-xml-external-entities-xxe-2017-owasp/1000":"/what/a4-xml-external-entities-xxe-2017-owasp","/what/teardrop-attack-what-is-it/1000":"/what/teardrop-attack-what-is-it","/what/what-is-a-ping-flood-dos-attack/1000":"/what/what-is-a-ping-flood-dos-attack","/what/what-is-spam-filtering-types-of-spam-filters/1000":"/what/what-is-spam-filtering-types-of-spam-filters","/what/api-securing-in-2021-top-10-best-practices/1000":"/what/api-securing-in-2021-top-10-best-practices","/what/identification-vs-authentication-vs-verification/1000":"/what/identification-vs-authentication-vs-verification","/what/what-is-an-insider-threat/1000":"/what/what-is-an-insider-threat","/what/hashing-vs-encryption-vs-salting/1000":"/what/hashing-vs-encryption-vs-salting","/whats-wallarm-learning-center-api-security/1000":"/whats-wallarm-learning-center-api-security","/solutions/wallarm-for-gcp/1000":"/solutions/wallarm-for-gcp","/what/what-is-dnssec-how-does-it-work/1000":"/what/what-is-dnssec-how-does-it-work","/what/security-misconfiguration/1000":"/what/security-misconfiguration","/what/what-is-a-backdoor-attack/1000":"/what/what-is-a-backdoor-attack","/what/improper-assets-management/1000":"/what/improper-assets-management","/what/what-is-virtual-private-cloud-vpc/1000":"/what/what-is-virtual-private-cloud-vpc","/what/what-is-congestion-in-networking/1000":"/what/what-is-congestion-in-networking","/what/shadow-it/1000":"/what/shadow-it","/what/what-is-iaas/1000":"/what/what-is-iaas","/what/what-is-a-cyber-attack/1000":"/what/what-is-a-cyber-attack","/what/what-is-hitrust-csf-a-guide-to-compliance/1000":"/what/what-is-hitrust-csf-a-guide-to-compliance","/what/what-is-clickjacking/1000":"/what/what-is-clickjacking","/what/website-security-and-prevention-of-a-http-flood-attack/1000":"/what/website-security-and-prevention-of-a-http-flood-attack","/what/what-is-a-load-balancer/1000":"/what/what-is-a-load-balancer","/resources/quickpass-case-study/1000":"/resources/quickpass-case-study","/what/what-is-a-pass-the-hash-attack/1000":"/what/what-is-a-pass-the-hash-attack","/what/what-is-the-heartbleed-vulnerability/1000":"/what/what-is-the-heartbleed-vulnerability","/what/api-discovery/1000":"/what/api-discovery","/product/api-threat-prevention/1000":"/product/api-threat-prevention","/what/12-important-pci-dss-compliance-requirements-to-follow/1000":"/what/12-important-pci-dss-compliance-requirements-to-follow","/what/cloud-orchestration/1000":"/what/cloud-orchestration","/what/cloud-security-posture-management/1000":"/what/cloud-security-posture-management","/what/what-is-email-injection/1000":"/what/what-is-email-injection","/what/guide-to-cmmc-the-cybersecurity-maturity-model-certification/1000":"/what/guide-to-cmmc-the-cybersecurity-maturity-model-certification","/what/software-defined-perimeter-everything-that-you-should-know/1000":"/what/software-defined-perimeter-everything-that-you-should-know","/what/the-concept-of-rce-remote-code-execution-attack/1000":"/what/the-concept-of-rce-remote-code-execution-attack","/what/what-is-api-testing-benefits-types-how-to-start/1000":"/what/what-is-api-testing-benefits-types-how-to-start","/what/what-is-basic-authentication-all-you-need-to-know/1000":"/what/what-is-basic-authentication-all-you-need-to-know","/what/make-your-shadow-apis-secure/1000":"/what/make-your-shadow-apis-secure","/what/automated-fingerprint-identification-system-afis/1000":"/what/automated-fingerprint-identification-system-afis","/what/what-a-vm-virtual-machine/1000":"/what/what-a-vm-virtual-machine","/what/open-redirect-vulnerability/1000":"/what/open-redirect-vulnerability","/what/google-dork-concepts-and-commands/1000":"/what/google-dork-concepts-and-commands","/what/how-to-identify-and-prevent-tiny-banker-trojan/1000":"/what/how-to-identify-and-prevent-tiny-banker-trojan","/resources/rappi-case-study/1000":"/resources/rappi-case-study","/what/difference-between-a-cdn-and-web-accelerator/1000":"/what/difference-between-a-cdn-and-web-accelerator","/what/a10-insufficient-logging-and-monitoring-2017-owasp/1000":"/what/a10-insufficient-logging-and-monitoring-2017-owasp","/what/what-is-attribute-based-access-control-abac-meaning/1000":"/what/what-is-attribute-based-access-control-abac-meaning","/what/a9-using-components-with-known-vulnerabilities-2017-owasp/1000":"/what/a9-using-components-with-known-vulnerabilities-2017-owasp","/what/what-is-threat-modeling/1000":"/what/what-is-threat-modeling","/what/nist-sp-800-82-compliance/1000":"/what/nist-sp-800-82-compliance","/whats-authors/ivan-lee/1000":"/whats-authors/ivan-lee","/what/what-is-hybrid-cloud/1000":"/what/what-is-hybrid-cloud","/what/what-is-cache-control-and-why-do-you-need-it-on-your-website/1000":"/what/what-is-cache-control-and-why-do-you-need-it-on-your-website","/what/api-endpoint/1000":"/what/api-endpoint","/what/trojan-horse-attack/1000":"/what/trojan-horse-attack","/what/what-is-content-delivery-network/1000":"/what/what-is-content-delivery-network","/what/how-oauth-differs-from-saml-and-openid-learn-it-all/1000":"/what/how-oauth-differs-from-saml-and-openid-learn-it-all","/what/what-is-circuit-breaker/1000":"/what/what-is-circuit-breaker","/what/http-request-smuggling/1000":"/what/http-request-smuggling","/what/qrljacking-overview-what-is-it/1000":"/what/qrljacking-overview-what-is-it","/what/what-is-the-cloud-controls-matrix/1000":"/what/what-is-the-cloud-controls-matrix","/what/what-is-a-transparent-proxy/1000":"/what/what-is-a-transparent-proxy","/what/ntp-amplification-attack-what-is-it/1000":"/what/ntp-amplification-attack-what-is-it","/what/broken-user-authentication/1000":"/what/broken-user-authentication","/wallarm-security-bug-bounty-program/1000":"/wallarm-security-bug-bounty-program","/what/what-is-a-honeypot-definition-types-and-more/1000":"/what/what-is-a-honeypot-definition-types-and-more","/what/what-is-dns-spoofing-dns-cache-poisoning/1000":"/what/what-is-dns-spoofing-dns-cache-poisoning","/what/what-is-captcha-types-and-examples/1000":"/what/what-is-captcha-types-and-examples","/what/command-injection-definition/1000":"/what/command-injection-definition","/what/what-is-juice-jacking-attack/1000":"/what/what-is-juice-jacking-attack","/what/what-is-wardriving-complete-guide/1000":"/what/what-is-wardriving-complete-guide","/what/dns-amplification-attacks-explained/1000":"/what/dns-amplification-attacks-explained","/what/path-traversal-attack/1000":"/what/path-traversal-attack","/what/what-is-virtualization-security-explanation-from-wallarm/1000":"/what/what-is-virtualization-security-explanation-from-wallarm","/what/buffer-overflow-attack-preventing-and-mitigation-methods-part-2/1000":"/what/buffer-overflow-attack-preventing-and-mitigation-methods-part-2","/what/malware-types-and-detection/1000":"/what/malware-types-and-detection","/what/what-is-cross-site-request-forgery/1000":"/what/what-is-cross-site-request-forgery","/what/log4j-vulnerability-all-that-you-must-know-about-it/1000":"/what/log4j-vulnerability-all-that-you-must-know-about-it","/what/whats-the-access-control-list-acl/1000":"/what/whats-the-access-control-list-acl","/what/what-is-eavesdropping-attack-definition-types-and-prevention/1000":"/what/what-is-eavesdropping-attack-definition-types-and-prevention","/cloud-native-products-101/what-is-helm/1000":"/cloud-native-products-101/what-is-helm","/what/intrusion-prevention-system/1000":"/what/intrusion-prevention-system","/what/password-spraying-attack/1000":"/what/password-spraying-attack","/what/openapi-vs-swagger-an-in-depth-clarification/1000":"/what/openapi-vs-swagger-an-in-depth-clarification","/what/trpc-protocol/1000":"/what/trpc-protocol","/what/a3-sensitive-data-exposure-2017-owasp/1000":"/what/a3-sensitive-data-exposure-2017-owasp","/what/cia-triad-definition/1000":"/what/cia-triad-definition","/what/siem-whats-security-information-and-event-management-technology-part-1/1000":"/what/siem-whats-security-information-and-event-management-technology-part-1","/what/explanation-of-the-zero-day-attack/1000":"/what/explanation-of-the-zero-day-attack","/what/what-is-anycast-and-how-does-it-work/1000":"/what/what-is-anycast-and-how-does-it-work","/what/what-is-api-versioning-standards-strategy/1000":"/what/what-is-api-versioning-standards-strategy","/what/cloud-elasticity/1000":"/what/cloud-elasticity","/what/smishing-attack-what-is-it/1000":"/what/smishing-attack-what-is-it","/what/sdk-vs-api-whats-the-difference/1000":"/what/sdk-vs-api-whats-the-difference","/what/what-is-microservices-architecture/1000":"/what/what-is-microservices-architecture","/what/what-is-system-hardening/1000":"/what/what-is-system-hardening","/what/transmission-control-protocol-tcp/1000":"/what/transmission-control-protocol-tcp","/what/what-is-cloud-scalability-types-examples-and-more/1000":"/what/what-is-cloud-scalability-types-examples-and-more","/what/what-is-security-service-edge-sse/1000":"/what/what-is-security-service-edge-sse","/what/business-logic-flaw/1000":"/what/business-logic-flaw","/what/what-is-elastic-load-balancer-in-aws/1000":"/what/what-is-elastic-load-balancer-in-aws","/what/a6-security-misconfiguration-2017-owasp/1000":"/what/a6-security-misconfiguration-2017-owasp","/what/what-is-factor-analysis-of-information-risk-fair/1000":"/what/what-is-factor-analysis-of-information-risk-fair","/what/what-is-an-information-disclosure-examples-and-prevention/1000":"/what/what-is-an-information-disclosure-examples-and-prevention","/what/layer-7-ddos-attacks/1000":"/what/layer-7-ddos-attacks","/what/what-is-data-exfiltration/1000":"/what/what-is-data-exfiltration","/what/what-is-cloud-computing/1000":"/what/what-is-cloud-computing","/what/mqtt-concept/1000":"/what/mqtt-concept","/what/the-concept-of-an-api-portal/1000":"/what/the-concept-of-an-api-portal","/what/social-engineering-types-prevention-methods/1000":"/what/social-engineering-types-prevention-methods","/what/what-is-devsecops/1000":"/what/what-is-devsecops","/what/what-is-fault-tolerance/1000":"/what/what-is-fault-tolerance","/gotestwaf/overview/1000":"/gotestwaf/overview","/what/rootkit-definition-how-to-remove-it/1000":"/what/rootkit-definition-how-to-remove-it","/what/lack-of-resources-rate-limiting/1000":"/what/lack-of-resources-rate-limiting","/what/nerc-cip-critical-infrastructure-protection/1000":"/what/nerc-cip-critical-infrastructure-protection","/what/what-is-a-beast-attack/1000":"/what/what-is-a-beast-attack","/what/types-of-phishing-attacks-and-business-impact/1000":"/what/types-of-phishing-attacks-and-business-impact","/resources/tipalti-case-study/1000":"/resources/tipalti-case-study","/what/what-is-a-casb-cloud-access-security-broker-definition-from-wallarm/1000":"/what/what-is-a-casb-cloud-access-security-broker-definition-from-wallarm","/what/what-is-service-mesh/1000":"/what/what-is-service-mesh","/what/arbitrary-code-execution-vulnerabilities/1000":"/what/arbitrary-code-execution-vulnerabilities","/what/what-is-exploit/1000":"/what/what-is-exploit","/what/format-string-vulnerability/1000":"/what/format-string-vulnerability","/what/what-is-ldap-injection-attack/1000":"/what/what-is-ldap-injection-attack","/cloud-native-products-101/istio/1000":"/cloud-native-products-101/istio","/what/how-this-ticket-scalping-bot-works-and-what-you-need-to-know/1000":"/what/how-this-ticket-scalping-bot-works-and-what-you-need-to-know","/what/mutual-authentication/1000":"/what/mutual-authentication","/what/comparison-of-vulnerability-scanning-vs-penetration-testing/1000":"/what/comparison-of-vulnerability-scanning-vs-penetration-testing","/what/what-is-saas/1000":"/what/what-is-saas","/what/crypto-malware/1000":"/what/crypto-malware","/what/what-is-pgp-encryption-everything-you-need-to-know/1000":"/what/what-is-pgp-encryption-everything-you-need-to-know","/what/what-is-multifactor-authentication-mfa/1000":"/what/what-is-multifactor-authentication-mfa","/what/a8-insecure-deserialization-2017-owasp/1000":"/what/a8-insecure-deserialization-2017-owasp","/what/what-is-the-data-plane/1000":"/what/what-is-the-data-plane","/what/cwe-common-weakness-enumeration/1000":"/what/cwe-common-weakness-enumeration","/what/gray-hat-hacker/1000":"/what/gray-hat-hacker","/what/osi-model-explanation/1000":"/what/osi-model-explanation","/what/ip-spoofing-definition-types-and-protection/1000":"/what/ip-spoofing-definition-types-and-protection","/what/a7-cross-site-scripting-xss-2017-owasp/1000":"/what/a7-cross-site-scripting-xss-2017-owasp","/what/soc-2-type-2-guide-compliance-and-certification-part-1/1000":"/what/soc-2-type-2-guide-compliance-and-certification-part-1","/what/smurf-ddos-attack/1000":"/what/smurf-ddos-attack","/what/recovery-point-objective-concept/1000":"/what/recovery-point-objective-concept","/what/lateral-movement-in-cyber-security/1000":"/what/lateral-movement-in-cyber-security","/what/what-is-serverless-architecture/1000":"/what/what-is-serverless-architecture","/what/tokenization/1000":"/what/tokenization","/what/critical-information-infrastructure-protection-ciip/1000":"/what/critical-information-infrastructure-protection-ciip","/what/cloud-firewall/1000":"/what/cloud-firewall","/what/attack-vector/1000":"/what/attack-vector","/what/penetration-testing-types/1000":"/what/penetration-testing-types","/what/how-to-protect-your-site-against-website-defacement-attacks/1000":"/what/how-to-protect-your-site-against-website-defacement-attacks","/what/server-side-request-forgery/1000":"/what/server-side-request-forgery","/what/what-is-high-availability/1000":"/what/what-is-high-availability","/what/coap-protocol-definition/1000":"/what/coap-protocol-definition","/what/vulnerability-remediation/1000":"/what/vulnerability-remediation","/what/what-exactly-is-role-based-access-control-rbac/1000":"/what/what-exactly-is-role-based-access-control-rbac","/what/drive-by-attack/1000":"/what/drive-by-attack","/what/what-is-ghost-api/1000":"/what/what-is-ghost-api","/what/orchestration-vs-choreography/1000":"/what/orchestration-vs-choreography","/what/a2-broken-authentication-2017-owasp/1000":"/what/a2-broken-authentication-2017-owasp","/what/cloud-monitoring-definition-types-advantages/1000":"/what/cloud-monitoring-definition-types-advantages","/what/sox-compliance/1000":"/what/sox-compliance","/what/what-is-ssh-protocol/1000":"/what/what-is-ssh-protocol","/what/what-is-a-spear-phishing-attack-how-to-prevent-one/1000":"/what/what-is-a-spear-phishing-attack-how-to-prevent-one","/what/what-is-edr/1000":"/what/what-is-edr","/resources/go-test-waf/1000":"/resources/go-test-waf","/what/circia-cyber-incident-reporting-for-critical-infrastructure-act/1000":"/what/circia-cyber-incident-reporting-for-critical-infrastructure-act","/what/credential-stuffing-attack/1000":"/what/credential-stuffing-attack","/what/what-is-java-api/1000":"/what/what-is-java-api","/what/insufficient-logging-monitoring/1000":"/what/insufficient-logging-monitoring","/what/what-is-a-supply-chain-attack/1000":"/what/what-is-a-supply-chain-attack","/what/ssi-injection-attack/1000":"/what/ssi-injection-attack","/what/what-is-a-blended-threat/1000":"/what/what-is-a-blended-threat","/what/api-gateway-vs-service-mesh/1000":"/what/api-gateway-vs-service-mesh","/what/sybil-attacks-in-the-blockchain-what-they-are-and-how-to-protect-your-tokens/1000":"/what/sybil-attacks-in-the-blockchain-what-they-are-and-how-to-protect-your-tokens","/what/best-anti-phishing-tool-in-2021/1000":"/what/best-anti-phishing-tool-in-2021","/what/what-is-soar-security-orchestration-automation-response/1000":"/what/what-is-soar-security-orchestration-automation-response","/what/what-is-ci-cd-concept-how-can-it-work/1000":"/what/what-is-ci-cd-concept-how-can-it-work","/what/what-is-computer-worm/1000":"/what/what-is-computer-worm","/what/what-is-cvss/1000":"/what/what-is-cvss","/what/lightweight-directory-access-protocol-ldap/1000":"/what/lightweight-directory-access-protocol-ldap","/what/standard-of-good-practice-for-information-security-sogp-full-guide/1000":"/what/standard-of-good-practice-for-information-security-sogp-full-guide","/what/what-is-a-swagger-editor/1000":"/what/what-is-a-swagger-editor","/what/web-filtering/1000":"/what/web-filtering","/what/how-to-be-essential-eight-compliant-in-2023/1000":"/what/how-to-be-essential-eight-compliant-in-2023","/what/api-security-tutorial/1000":"/what/api-security-tutorial","/what/ransom-ddos-rddos-attack/1000":"/what/ransom-ddos-rddos-attack","/resources/api-security-checklist/1000":"/resources/api-security-checklist","/what/remote-work-security/1000":"/what/remote-work-security","/what/devops-toolchain-and-how-does-it-work/1000":"/what/devops-toolchain-and-how-does-it-work","/what/top-18-critical-security-controls-cis/1000":"/what/top-18-critical-security-controls-cis","/what/what-is-graphql-definition-with-example/1000":"/what/what-is-graphql-definition-with-example","/what/zip-bomb/1000":"/what/zip-bomb","/what/parameter-tampering-attack/1000":"/what/parameter-tampering-attack","/what/what-is-the-difference-between-csrf-and-xss/1000":"/what/what-is-the-difference-between-csrf-and-xss","/what/find-out-what-mtu-and-mss-are/1000":"/what/find-out-what-mtu-and-mss-are","/what/a04-2021-owasp-software-and-data-integrity-failures/1000":"/what/a04-2021-owasp-software-and-data-integrity-failures","/what/extensible-messaging-presence-protocol/1000":"/what/extensible-messaging-presence-protocol","/what/what-is-unified-endpoint-management-uem/1000":"/what/what-is-unified-endpoint-management-uem","/what/the-concept-of-a-firewall/1000":"/what/the-concept-of-a-firewall","/what/arp-spoofing-or-arp-poisoning/1000":"/what/arp-spoofing-or-arp-poisoning","/what/what-is-a-web-shell-attack-how-to-detect-and-prevent-it/1000":"/what/what-is-a-web-shell-attack-how-to-detect-and-prevent-it","/what/what-is-application-virtualization-by-wallarm/1000":"/what/what-is-application-virtualization-by-wallarm","/resources/1000":"/resources","/what/what-is-rat-remote-access-trojan/1000":"/what/what-is-rat-remote-access-trojan","/what/a04-2021-the-insecure-design/1000":"/what/a04-2021-the-insecure-design","/what/what-is-machine-learning/1000":"/what/what-is-machine-learning","/what/zero-click-attack/1000":"/what/zero-click-attack","/what/white-hat-hacker/1000":"/what/white-hat-hacker","/what/nist-cybersecurity-framework-csf/1000":"/what/nist-cybersecurity-framework-csf","/what/what-is-web-services-description-language-wsdl/1000":"/what/what-is-web-services-description-language-wsdl","/what/xmpp-vs-websocket-which-to-use-for-applications/1000":"/what/xmpp-vs-websocket-which-to-use-for-applications","/what/grpc-vs-rest-comparing-key-api-designs-and-deciding-which-one-is-best/1000":"/what/grpc-vs-rest-comparing-key-api-designs-and-deciding-which-one-is-best","/what/soc-1-vs-soc-2-vs-soc-3-decoding-the-compliances-mystery/1000":"/what/soc-1-vs-soc-2-vs-soc-3-decoding-the-compliances-mystery","/what/what-is-an-idp-identity-provider/1000":"/what/what-is-an-idp-identity-provider","/what/what-is-a-ping-of-death-assault/1000":"/what/what-is-a-ping-of-death-assault","/what/black-hat-hacker/1000":"/what/black-hat-hacker","/what/what-is-a-botnet/1000":"/what/what-is-a-botnet","/what/the-concept-of-an-api-gateway/1000":"/what/the-concept-of-an-api-gateway","/what/ncsc-cyber-assessment-framework-caf/1000":"/what/ncsc-cyber-assessment-framework-caf","/what/what-is-penetration-testing/1000":"/what/what-is-penetration-testing","/what/what-is-minification-and-why-is-it-needed/1000":"/what/what-is-minification-and-why-is-it-needed","/what/what-is-the-control-plane/1000":"/what/what-is-the-control-plane","/what/data-anonymization/1000":"/what/data-anonymization","/what/what-is-an-api-call/1000":"/what/what-is-an-api-call","/what/how-to-become-a-penetration-tester/1000":"/what/how-to-become-a-penetration-tester","/what/what-is-elliptic-curve-cryptography/1000":"/what/what-is-elliptic-curve-cryptography","/what/booters-stressers-and-ddosers/1000":"/what/booters-stressers-and-ddosers","/what/what-is-remote-file-inclusion-rfi/1000":"/what/what-is-remote-file-inclusion-rfi","/product/wallarm-cloud-native-platform-overview/1000":"/product/wallarm-cloud-native-platform-overview","/what/what-is-slowloris/1000":"/what/what-is-slowloris","/what/what-is-a-kubernetes-pod/1000":"/what/what-is-a-kubernetes-pod","/what/dark-web-monitoring/1000":"/what/dark-web-monitoring","/what/what-is-xml-rpc-and-why-do-you-need-to-secure-it/1000":"/what/what-is-xml-rpc-and-why-do-you-need-to-secure-it","/what/rate-limiting/1000":"/what/rate-limiting","/what/soc-2-type-2-guide-compliance-and-certification-part-2/1000":"/what/soc-2-type-2-guide-compliance-and-certification-part-2","/what/what-is-chief-information-security-officer-ciso/1000":"/what/what-is-chief-information-security-officer-ciso","/what/what-is-progressive-delivery/1000":"/what/what-is-progressive-delivery","/what/xpath-injection-attack/1000":"/what/xpath-injection-attack","/what/what-is-the-reverse-proxy/1000":"/what/what-is-the-reverse-proxy","/what/what-is-privilege-escalation-attack/1000":"/what/what-is-privilege-escalation-attack","/what/what-is-an-ingress-controller/1000":"/what/what-is-an-ingress-controller","/what/what-is-a-dmz/1000":"/what/what-is-a-dmz","/what/what-is-saml-authentication/1000":"/what/what-is-saml-authentication","/what/what-is-aslr-address-space-layout-randomization/1000":"/what/what-is-aslr-address-space-layout-randomization","/what/what-is-cobit-control-objectives-for-information-technology/1000":"/what/what-is-cobit-control-objectives-for-information-technology","/what/the-isa-iec-62443-series-of-standards-full-guide/1000":"/what/the-isa-iec-62443-series-of-standards-full-guide","/what/data-scraping/1000":"/what/data-scraping","/what/websocket-vs-http-how-are-these-2-different/1000":"/what/websocket-vs-http-how-are-these-2-different","/what/pretexting-types-and-prevention-methods/1000":"/what/pretexting-types-and-prevention-methods","/what/common-vulnerabilities-and-exposures-cve/1000":"/what/common-vulnerabilities-and-exposures-cve","/what/structured-query-language-injection-sqli-part-1/1000":"/what/structured-query-language-injection-sqli-part-1","/what/what-is-an-ssl-certificate/1000":"/what/what-is-an-ssl-certificate","/what/udp-flood-attack/1000":"/what/udp-flood-attack","/what/what-is-canary-deployment-meaning-strategy/1000":"/what/what-is-canary-deployment-meaning-strategy","/what/differences-soap-vs-rest/1000":"/what/differences-soap-vs-rest","/product/api-security-overview/1000":"/product/api-security-overview","/what/types-of-ddos-attack-and-measures-protection/1000":"/what/types-of-ddos-attack-and-measures-protection","/what/ip-fragmentation-attack/1000":"/what/ip-fragmentation-attack","/what/15-must-have-tools-for-penetration-testing/1000":"/what/15-must-have-tools-for-penetration-testing","/what/what-is-a-google-hack/1000":"/what/what-is-a-google-hack","/what/what-is-sd-wan-software-defined/1000":"/what/what-is-sd-wan-software-defined","/what/how-to-hack-api-in-60-minutes-with-open-source/1000":"/what/how-to-hack-api-in-60-minutes-with-open-source","/whats-authors/mukhaddin-beshkov/1000":"/whats-authors/mukhaddin-beshkov","/what/iot-attack/1000":"/what/iot-attack","/what/grpc-vs-websocket-when-is-it-better-to-use/1000":"/what/grpc-vs-websocket-when-is-it-better-to-use","/what/cyberwarfare/1000":"/what/cyberwarfare","/what/what-is-wadl/1000":"/what/what-is-wadl","/what/defense-in-depth-concept/1000":"/what/defense-in-depth-concept","/what/what-is-json-rpc/1000":"/what/what-is-json-rpc","/what/what-is-mitm-man-in-the-middle-attack/1000":"/what/what-is-mitm-man-in-the-middle-attack","/what/api-management-for-iot/1000":"/what/api-management-for-iot","/what/a02-2021-cryptographic-failures/1000":"/what/a02-2021-cryptographic-failures","/what/a-simple-explanation-of-what-a-webhook-is/1000":"/what/a-simple-explanation-of-what-a-webhook-is","/what/the-difference-between-vulnerability-assessments-penetration-testing/1000":"/what/the-difference-between-vulnerability-assessments-penetration-testing","/what/nosql-injection-attack/1000":"/what/nosql-injection-attack","/what/what-is-a-crd-custom-resource-definition/1000":"/what/what-is-a-crd-custom-resource-definition","/what/what-is-an-on-path-attacker/1000":"/what/what-is-an-on-path-attacker","/what/log-forging-attack/1000":"/what/log-forging-attack","/what/what-is-a-kubernetes-cluster-and-how-does-it-work/1000":"/what/what-is-a-kubernetes-cluster-and-how-does-it-work","/what/how-to-stop-ddos-attacks-with-a-small-budget/1000":"/what/how-to-stop-ddos-attacks-with-a-small-budget","/what/api-key-meaning-what-is-it-and-what-is-it-for/1000":"/what/api-key-meaning-what-is-it-and-what-is-it-for","/what/vishing-attack/1000":"/what/vishing-attack","/what/session-hijacking-attack/1000":"/what/session-hijacking-attack","/what/what-is-high-orbit-ion-cannon-hoic/1000":"/what/what-is-high-orbit-ion-cannon-hoic","/what/buffer-overflow-attack-definition-types-use-by-hackers-part-1/1000":"/what/buffer-overflow-attack-definition-types-use-by-hackers-part-1","/what/crlf-injection-attack/1000":"/what/crlf-injection-attack","/what/what-is-a-single-points-of-failure-spof/1000":"/what/what-is-a-single-points-of-failure-spof","/what/poodle-attack/1000":"/what/poodle-attack","/what/token-based-authentication/1000":"/what/token-based-authentication","/what/waf-meaning/1000":"/what/waf-meaning","/what/what-is-an-api-token-quick-guide/1000":"/what/what-is-an-api-token-quick-guide","/what/what-is-a-race-condition/1000":"/what/what-is-a-race-condition","/what/reflected-xss-attack/1000":"/what/reflected-xss-attack","/what/fork-bomb/1000":"/what/fork-bomb","/what/what-is-fido-fast-identity-online/1000":"/what/what-is-fido-fast-identity-online","/what/what-is-dns-hijacking-basic-methods-of-protection/1000":"/what/what-is-dns-hijacking-basic-methods-of-protection","/what/white-box-testing/1000":"/what/white-box-testing","/what/what-is-openapi/1000":"/what/what-is-openapi","/what/excessive-data-exposure/1000":"/what/excessive-data-exposure","/what/hacktivism/1000":"/what/hacktivism","/what/reverse-shell/1000":"/what/reverse-shell","/what/what-is-microsegmentation-guide-by-wallarm/1000":"/what/what-is-microsegmentation-guide-by-wallarm","/what/oauth-vs-jwt-detailed-comparison/1000":"/what/oauth-vs-jwt-detailed-comparison","/what/a-simple-explanation-of-what-a-websocket-is/1000":"/what/a-simple-explanation-of-what-a-websocket-is","/what/server-side-template-injection-ssti-vulnerability/1000":"/what/server-side-template-injection-ssti-vulnerability","/what/websocket-vs-rest-api/1000":"/what/websocket-vs-rest-api","/what/what-is-amqp/1000":"/what/what-is-amqp","/what/a1-injection-2017-owasp/1000":"/what/a1-injection-2017-owasp","/what/what-is-low-orbit-ion-cannon-loic/1000":"/what/what-is-low-orbit-ion-cannon-loic","/what/what-is-syn-spoofing-or-tcp-reset-attack/1000":"/what/what-is-syn-spoofing-or-tcp-reset-attack","/what/what-is-auto-scaling/1000":"/what/what-is-auto-scaling","/what/api8-injection/1000":"/what/api8-injection","/what/mass-assignment/1000":"/what/mass-assignment","/what/what-is-http-2-and-how-is-it-different-from-http-1/1000":"/what/what-is-http-2-and-how-is-it-different-from-http-1","/what/crud-meaning/1000":"/what/crud-meaning","/what/what-is-hulk-http-unbearable-load-king/1000":"/what/what-is-hulk-http-unbearable-load-king","/what/pharming-attack/1000":"/what/pharming-attack","/what/what-is-a-systems-development-life-cycle-sdlc/1000":"/what/what-is-a-systems-development-life-cycle-sdlc","/solutions/waf-for-kubernetes/1000":"/solutions/waf-for-kubernetes","/wallarm-in-columbus":"/2024-api-and-application-security-summit-in-columbus","/webinars/a-best-practices-checklist-for-securing-your-apis-and-applications-the-cisos-approach":"/webinars/a-cisos-checklist-for-securing-apis-and-applications","/solutions/detect-all-attacks":"/solutions/detect-and-stop-attacks","/webinars/a-cisos-view-on-the-state-of-api-security-discussing-the-api-threatstats-tm-report-q2-2024":"/webinars/a-cisos-view-on-the-state-of-api","/solutions/by-use-case-respond-to-api-attacks":"/solutions/respond-to-api-attacks","/wallarm-in-chicago---2024-api-and-application-security-summit-in-chicago":"/chicago-api-security-summit","/minneapolis-api-security-summit-2024":"/minneapolis-api-security-summit-2025","/integrated-app-and-api-security-product-datasheet":"/integrated-api-security-datasheet","/resources/integrated-app-and-api-security-product-datasheet":"/resources/integrated-api-security-datasheet","/resources/wallarm-api-securitya-and-waf-for-nginx":"/resources/wallarm-api-security-for-nginx","/resources/ai-power-security":"/resources/ai-powered-api-security","/solutions/kubernetes-api-security-and-waf-waap":"/solutions/kubernetes-api-security","/resources/2025-api-threatstats-report-ai-security-at-raise":"/reports/2025-api-security-report","/resources/2025-api-threatstats-tm-report":"/reports/2025-api-security-report","/resources/wallarm-annual-2025-api-threatstats-tm-report":"/reports/2025-api-security-report","/solutions/protect-agentic-ai":"/solutions/s-protect-agentic-ai","/application-discovery":"/content-aware-access-controls","/content-aware-access-controls":"/service-to-service-authorization","/resources/api-threatstats-report-q1-2025":"/reports/q1-2025-wallarm-api-threatstats-report","/whats-authors/mukhaddin-beshkov":"/whats-authors/mukhadin-beschokov","/blackhat-2023":"/wallarm-black-hat-2025","/product/rk-copy-3-aasm-sign-up-form":"/product/copy-3-aasm-sign-up-form","/reports/q2-2025-wallarm-api-threatstats-report-hide":"/reports/q2-2025-wallarm-api-threatstats-report","/resources/api-threatstats-report-q2-2025":"/reports/q2-2025-wallarm-api-threatstats-report?r=092025","/resources/api-security-checklist":"/resources/securing-enterprise-apis-a-technical-guide-for-practitioners","/product/fast":"/product/security-testing","/company-why-wallarm":"/why-wallarm","/why-wallarm":"/product/api-security-overview","/resources/api-threatstats-report-q3-2025":"/reports/q3-2025-wallarm-api-threatstats-report","/project-api-firewall":"/api-firewall","/request-demo-b-version":"/api-security-demo","/reports/latest":"/reports/2026-wallarm-api-threatstats-report","/resources/2026-threatstats-report":"/reports/2026-wallarm-api-threatstats-report","/hoe-hero-test-3-2026":"/home-hero-test-3-2026","/comparison-thank-you":"/content-download-thank-you/competitive-report","/request-demo-thank-you":"/demo-sign-up-thank-you","/wallarm-free-tier":"/try-wallarm-free"},"cosmic":[{"mountPath":"/whats-wallarm-learning-center-api-security-owasp","workerUrl":"https://04af9ceb-9f11-4511-9711-9ff2517b0ca5.wf-app-prod.cosmic.webflow.services","showWebflowBadge":false},{"mountPath":"/whats-wallarm-learning-center-pentest","workerUrl":"https://1aa87935-62e7-409f-affe-714637a28430.wf-app-prod.cosmic.webflow.services","showWebflowBadge":false},{"mountPath":"/whats-wallarm-learning-center-attacks","workerUrl":"https://2c90d3f9-546c-4d7f-9274-bb0b0f38bcec.wf-app-prod.cosmic.webflow.services","showWebflowBadge":false},{"mountPath":"/whats-wallarm-learning-center-owasp","workerUrl":"https://62888e56-fb89-4ede-9e67-941eb3656764.wf-app-prod.cosmic.webflow.services","showWebflowBadge":false},{"mountPath":"/whats-wallarm-learning-center-vulnerabilities","workerUrl":"https://86621250-ee81-44df-bb6e-830496ed7ead.wf-app-prod.cosmic.webflow.services","showWebflowBadge":false},{"mountPath":"/whats-wallarm-learning-center-waf","workerUrl":"https://a33c3ac8-c50d-4949-bf21-6ceb072901c5.wf-app-prod.cosmic.webflow.services","showWebflowBadge":false},{"mountPath":"/whats-wallarm-learning-center-devsecops","workerUrl":"https://ca8e7738-6174-4991-94ad-f173583e05f0.wf-app-prod.cosmic.webflow.services","showWebflowBadge":false},{"mountPath":"/what","workerUrl":"https://d5f7ff95-2c90-4495-af02-0179fb50b8a4.wf-app-prod.cosmic.webflow.services","showWebflowBadge":false},{"mountPath":"/whats-wallarm-learning-center-api-security","workerUrl":"https://fb6a7036-d699-4045-9cae-1b4a4f15ce83.wf-app-prod.cosmic.webflow.services","showWebflowBadge":false}],"headers":{"content-security-policy":"frame-ancestors 'self'","x-frame-options":"SAMEORIGIN","strict-transport-security":"max-age=31536000"},"publicationVersion":"69d0237751a8b8d3bfc44144","publishVersion":135,"upstreamRenderer":"react","lazyRenderStaticPages":true,"localization":{"locales":{"jp":{"tag":"ja","primary":false,"_id":"6795bd53f0e1230453003044","cmsId":"6795bd53f0e123045300304b","staticPageSlugs":{},"detailPages":{"webinars":"/detail_webinars","resources":"/detail_resources","what":"/detail_what","cloud-native-products-101":"/detail_cloud-native-products-101","whats-authors":"/detail_whats-authors","document-types":"/detail_document-types","news":"/detail_news","press-releases":"/detail_press-releases","analyst-research":"/detail_analyst-research","slides-black-hat":"/detail_slides-black-hat"},"dynListPages":{}},"":{"tag":"en","primary":true,"_id":"65df9a327c809c0103404cc2","cmsId":"653ad0c2e882f528b3f79ae6","staticPageSlugs":{},"detailPages":{},"dynListPages":{}}},"deadPages":[],"primaryRedirect":null,"browserDetection":false,"enableHreflangLinks":true,"hrefPrefixForHreflangLinks":"https://www.wallarm.com"}}