🎉 Gartner® ranks Data Theorem #1 in Cloud Native Apps in the 2025 Critical Capabilities for AST

Learn more

Webinars

Why Security Teams are Urgently Chasing API Security
play_arrow
25 MINS

Why Security Teams are Urgently Chasing API Security

The Silent Threat: Uncovering the Vulnerabilities of APIs

Read More arrow_right_alt
Learn Why an App-centric Approach Is Critical to Securing the Cloud
play_arrow
11 MINS

Learn Why an App-centric Approach Is Critical to Securing the Cloud

Cloud security must provide full discovery and remediation of interconnected apps and APIs.

Read More arrow_right_alt
Advanced Security Training: How to Start an API Security Program
play_arrow
30 MINS

Advanced Security Training: How to Start an API Security Program

Build a successful API Security Program with continuous inventory of all APIs.

Read More arrow_right_alt
What’s Missing in your API Security Program?
play_arrow
30 MINS

What’s Missing in your API Security Program?

Learn about the common challenges that are easily missed in most API security programs.

Read More arrow_right_alt
5 Web Security Considerations for GraphQL
play_arrow
30 MINS

5 Web Security Considerations for GraphQL

A summary on the 5 most common GraphQL security vulnerabilities and how to leverage full stack security to overcome security gaps.

Read More arrow_right_alt
Security and Privacy Changes in iOS 14
play_arrow
56 MINS

Security and Privacy Changes in iOS 14

A summary for app developers on iOS 14 and what they need to do to stay compliant and secure user data.

Read More arrow_right_alt
How to Leverage iOS 13 for App Security
play_arrow
18 MINS

How to Leverage iOS 13 for App Security

Get briefed quickly on the latest security changes on iOS 13.

Read More arrow_right_alt
Security and Privacy Changes in Android 11
play_arrow
30 MINS

Security and Privacy Changes in Android 11

A summary for app developers on Android 11 and what they need to do to stay compliant and secure user data.

Read More arrow_right_alt
Virtual Roundtable: 3 Ways to Create Successful FinTech App Security Programs
play_arrow
36 MINS

Virtual Roundtable: 3 Ways to Create Successful FinTech App Security Programs

Leaders from Intuit, East West Bank, and Robinhood discuss the ways they manage AppSec successfully.

Read More arrow_right_alt
Security Automation on AWS
play_arrow
19 MINS

Security Automation on AWS

How can we prevent data breaches that are caused by very simple processes like closing an AWS bucket?

Read More arrow_right_alt
How Low-Tech Hackers Hack Your APIs in 15 Minutes or Less
play_arrow
20 MINS

How Low-Tech Hackers Hack Your APIs in 15 Minutes or Less

It’s not easy to protect something you don’t know exists. How can companies inventory their APIs and protect them from potential attacks?

Read More arrow_right_alt
Kids, Privacy, and Apps
play_arrow
23 MINS

Kids, Privacy, and Apps

Get tips and guidance for managing app security and how to keep data secure using common apps.

Read More arrow_right_alt
Serverless vs Containers: A Case Study of Securing Microservices
play_arrow
30 MINS

Serverless vs Containers: A Case Study of Securing Microservices

See the results from Data Theorem’s head-to-head experiment on one of its biggest products.

Read More arrow_right_alt
Did You Know CCPA Has Already Begun?
play_arrow
30 MINS

Did You Know CCPA Has Already Begun?

Learn how to prepare your data, mobile apps, web apps, and APIs.

Read More arrow_right_alt
How to Automate an API Security Program
play_arrow
24 MINS

How to Automate an API Security Program

Learn the prominence of APIs in today’s landscape and how to build an API security framework.

Read More arrow_right_alt
How to Deal with Fraudulent Counterfeit Apps
play_arrow
3 MINS

How to Deal with Fraudulent Counterfeit Apps

Overcoming the challenges of fraudulent counterfeit apps and their business impacts.

Read More arrow_right_alt
Automating Software Security Checks for Open Source Software and SDKs
play_arrow
27 MINS

Automating Software Security Checks for Open Source Software and SDKs

A modern approach to security checks for third-party software through automation.

Read More arrow_right_alt
Automate Compliance Audits without the Staff
play_arrow
30 MINS

Automate Compliance Audits without the Staff

How to deliver continuous compliance for APIs and mobile apps.

Read More arrow_right_alt
Top 6 Security Needs for APIs and Serverless Apps
play_arrow
30 MINS

Top 6 Security Needs for APIs and Serverless Apps

The top 6 API security needs for APIs and apps across serverless platforms such as AWS Lambda, Google Cloud Functions and Azure Functions.

Read More arrow_right_alt