E Com Security Solutions: Security Blog

The Official Security Blog of E Com Security Solutions for advancing the security capabilities of leading businesses and organizations throughout the world.

Security Blog2026-02-16T18:58:38+00:00

Insights on Vulnerability Management

Cyberattacks can cost millions to resolve and make headline news. The attack surfaces keep expanding as organizations connect assets, allow remote work, and promote virtual customer engagement. It's hard to keep up in today's intense threat landscape. How are organizations weathering this complexity? The E Com Security Solutions survey set [...]

Mitigating API Security Risks

Securing all your APIs is difficult. It’s even more complicated when your keys and tokens are exposed involuntarily in real-world settings, from APIs to frontends. Your organization is now prone to data breach risks and severe financial implications. E Com Security Solutions study reveals that API secret sprawl extends across [...]

Practical guide to API Security

APIs come in many flavours, including REST, SOAP, graphQL, gRPC, and WebSockets, and each has its use cases and common vulnerabilities. The issues covered in this guide can occur in any API. Regardless of which technology you have used to implement your API, read on to find out what you [...]

Mitigating Application Security Threats

One of the key reasons for application vulnerabilities is a lack of secure design, development, implementation, and operations. Relying solely on post-development audits for security is inadequate. Instead, security must be an inherent and integral aspect seamlessly integrated into the application's design and development lifecycle. Organizations should incorporate secured application [...]

Application Threat Modeling

Application security is a multilayered approach that requires a combination of technical controls, secure development practices, user awareness, and proactive monitoring. It should be considered at the earliest stage of the software development lifecycle. Threat modelling evaluates information affecting an application's security and organizes it into a structured representation to [...]

Go to Top