Solutions

Utility pages
Eliminate Shadow AICentralized AI LoggingAI Security Posture ManagementAI Detection & ResponseAI Governance
BlogPodcastResources
Schedule a Demo

Building an AI Governance Program: Lessons from the Enterprise - Free Webinar

Watch Now

WAF

All
OWASP LLM TOP 10
All
AI Security
All
Product
All
A View from the C-Suite
All
Fintech
All
cloud security
All
AI
All
Awards
All
API economy
All
podcast
All
WAF
All
Events
All
Cybersecurity
All
Cyber landscape
All
Company
All
API security
Tomcat RCE Vulnerability Now Exploited in the Wild
March 20, 2025

Tomcat RCE Vulnerability Now Exploited in the Wild

Researchers recently found a vulnerability in Apache Tomcat’s servers that would allow an attacker to commit Remote Code Execution with a single PUT request to a specific API, followed by a GET. And now, this vulnerability is officially being exploited in the wild.

Read more

DFIR & API Breaches: Why Context Matters
December 5, 2023

DFIR & API Breaches: Why Context Matters

When it comes to investigating and preventing API breaches, context is king. In this piece, we take a look at why application layer visibility is essential to effective digital forensics and incident response.

Read more

 Web Application Firewalls & API Security: Why WAFs Always Fall Short
October 4, 2023

Web Application Firewalls & API Security: Why WAFs Always Fall Short

While Web Application Firewalls, or WAFs, are often touted as a go-to solution for web app security, they frequently fall short – and in many cases, offer little more than an artificial sense of protection that is not backed by actual protection. But why isn’t a WAF good enough? Where do they fall short, and what is the better alternative? Let’s dive a bit deeper.

Read more

Exploring the Pros and Cons of Web Application Firewalls (WAFs)
February 16, 2023

Exploring the Pros and Cons of Web Application Firewalls (WAFs)

Over the last few years, web application attacks have become one of the leading causes of data breaches, making web application security increasingly important for overall security posture.

Read more

The WAF must die - some interesting thoughts
July 18, 2022

The WAF must die - some interesting thoughts

A recent posting by Dr. Chase Cunningham from Ericom Software on LinkedIn took an interesting view on web application firewalls, most commonly known as a WAF.

Read more

Certification & Awards
AICPA SOC 2 TYPE 2Cybertech 100 2023Blackhat Startup Spotlight FinalistBlackhat USA 2025 Startup Spotlight Finalist
Get the FireTail newsletter
Stay informed about FireTail and AI security
AI Security Platform
  • AI Security Overview
  • AI Discovery
  • AI Inventory
  • Eliminate Shadow AI
  • AI Security Posture Management
  • Shift-Left AI Security
  • AI Security Testing
  • Centralized AI Logging
  • Complete AI Audit Trail
  • AI Governance
  • AI Audit
API Security Platform
  • API Security Overview
  • API Discovery
  • API Inventory
  • API Security Posture Management
  • Shift-Left API Security
  • API Security Testing
  • Centralized API Logging
  • Complete API Audit Trail
  • API Detection & Response
Other Pages
  • Home
  • About
  • Contact
  • Blog
  • Careers
  • Open Source
  • API Data Breach Tracker
  • AI Incident Tracker
  • Documentation
  • Integrations
  • Release Notes
Follow us
  • 
    LinkedIn
  • 
    YouTube

Copyright © 2021-2025 | FireTail Inc & subsidiaries, DBA FireTail (TM) at FireTail.io | Privacy Policy | Terms of Service | Responsible Disclosures

This site uses cookies

By using this website, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

Got it!