• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

Upwind’s ML cloud platform collects multi-layer telemetry data of the networking stack for real-time detection of threats to APIs, enabling 7X reduction in the mean time to respond

April 23, 2025 //  by Finnovate

Upwind has added a feature to its cloud application detection and response (CADR) platform, allowing real-time detection of threats to application programming interfaces (APIs). The platform uses machine learning algorithms to collect telemetry data from Layers 3, 4, and 7 of the networking stack, enabling the identification of deviations and anomalous behavior in API traffic. The goal is to reduce the time required to investigate API security incidents by up to 10 times and mean time to response times by up to seven times. In the age of generative artificial intelligence (AI), there is a growing focus on API security. Many organizations are discovering that sensitive data is being shared inadvertently with AI models. Historically, responsibility for securing APIs has been unclear, with many cybersecurity teams assuming that application development teams are securing them as they are developed. However, this can lead to thousands of APIs that cybercriminals can exploit to exfiltrate data or modify business logic. Over the next 12-18 months, organizations plan to increase software security spend on APIs, DevOps toolchains, incident response, open source software, software bill of materials, and software composition analysis tools. Advancements in AI and eBPF technologies could simplify the entire software development lifecycle by streamlining the collection and analysis of telemetry data.

Read Article

Category: Members, Cybersecurity, Innovation Topics

Previous Post: « Microsoft Sentinel enables more accurate event reconstruction by integrating Endace’s one-click, drill-down access to definitive, full packet evidence and SIEM workflows
Next Post: Apache Airflow 3.0’s event-driven data orchestration makes real-time, multi-step inference process possible at scale across various enterprise use cases »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.OkayPrivacy policy