🎉 Gartner® ranks Data Theorem #1 in Cloud Native Apps in the 2025 Critical Capabilities for AST

Learn more

Videos

Why Security Teams are Urgently Chasing API Security
play_arrow
25 MINS

Why Security Teams are Urgently Chasing API Security

The Silent Threat: Uncovering the Vulnerabilities of APIs

Read More arrow_right_alt
How An Unsecured Server Led To A Microsoft Data Breach
play_arrow
20 MINS

How An Unsecured Server Led To A Microsoft Data Breach

Learn how a cloud resource within the iOS Bing mobile app was left open on the internet, which is another recent example of a full stack application attack.

Read More arrow_right_alt
How Attackers Are Taking Advantage of Covid and Mobile Phishing
play_arrow
14 MINS

How Attackers Are Taking Advantage of Covid and Mobile Phishing

How cyber security companies are seeing a huge uptick in mobile phishing due to recent reports of vaccines coming out to improve the pandemic.

Read More arrow_right_alt
What Is Full Stack Application Security?
play_arrow
1 MINS

What Is Full Stack Application Security?

Learn what full stack application security truly is and how each layer is interdependent on another.

Read More arrow_right_alt
Introduction to Web Secure
play_arrow
8 MINS

Introduction to Web Secure

Data Theorem’s Web Secure product analyzes and protects single page applications (SPA), their embedded APIs, and underlying cloud resources.

Read More arrow_right_alt
How Modern Data Breaches Attack Every Layer of the Application Stack
play_arrow
15 MINS

How Modern Data Breaches Attack Every Layer of the Application Stack

Review key findings from Verizon's 2020 Data Breach Incident Report (DBIR).

Read More arrow_right_alt
iOS Clipboard Spying
play_arrow
21 MINS

iOS Clipboard Spying

Learn how your app developers can avoid accidentally capturing sensitive data from the iOS clipboard from their use of SDKs or third-party libraries.

Read More arrow_right_alt
How Integrated, Continuous Security Checks Can Save Your Business and Millions of Dollars
play_arrow
22 MINS

How Integrated, Continuous Security Checks Can Save Your Business and Millions of Dollars

How a recent data breach exposed 40 million private user records including geolocation and user photos of minors.

Read More arrow_right_alt
Exploit Analysis: Sign-in With Apple
play_arrow
18 MINS

Exploit Analysis: Sign-in With Apple

Get a technical analysis of a recently discovered mobile exploit.

Read More arrow_right_alt
How to Protect Application Attack Surfaces
play_arrow
18 MINS

How to Protect Application Attack Surfaces

Learn how you can build a comprehensive security program that will automate key security policies across your entire data environment.

Read More arrow_right_alt
Live Demo: Case Study – Provident Credit Union
play_arrow
23 MINS

Live Demo: Case Study – Provident Credit Union

Learn from our customer, Provident Credit Union, about how they manage their banking app with a 3rd party vendor, while protecting critical data.

Read More arrow_right_alt
Why Stop AppSec Data Breaches?
play_arrow
25 MINS

Why Stop AppSec Data Breaches?

Using recent data breach examples, we define an AppSec data breach, the risks involved with 3rd party software, and how to prevent them.

Read More arrow_right_alt
Introduction to API Secure
play_arrow
5 MINS

Introduction to API Secure

Identify your entire attack surface by hacking your APIs, help you find shadow APIs, and better prepare you for securing your data.

Read More arrow_right_alt
Protect Web Apps from XSS Exploits
play_arrow
22 MINS

Protect Web Apps from XSS Exploits

Arm yourself with the knowledge needed to identify a cross-site scripting attack and secure your data.

Read More arrow_right_alt
Contact Tracing 101
play_arrow
14 MINS

Contact Tracing 101

Learn about how contact tracing works, the proposed use of it, and how it will impact mobile privacy.

Read More arrow_right_alt
Inside Data Theorem’s Mobile AppSec Program
play_arrow
5 MINS

Inside Data Theorem’s Mobile AppSec Program

Find out how Data Theorem’s automated mobile AppSec program works faster and more securely for your security and DevOps teams.

Read More arrow_right_alt
Automated Security for DevOps
play_arrow
2 MINS

Automated Security for DevOps

Data Theorem delivers automated security for DevOps, ushering in a new era of DevSecOps.

Read More arrow_right_alt
Customer Case Study: Evernote
play_arrow
3 MINS

Customer Case Study: Evernote

Data Theorem provides 100% security coverage of Evernote's entire mobile application portfolio with backend API services.

Read More arrow_right_alt
Data Theorem Interview Digital Anarchist RSA Conference 2019
play_arrow
11 MINS

Data Theorem Interview Digital Anarchist RSA Conference 2019

How we help customers with their data risk from mobile to API, assisting in the devops lifecycle.

Read More arrow_right_alt