Salt Security


COMPANY OVERVIEW

About Salt Security

Contact

More Info on Salt Security

Products and Press Releases

Cybersecurity

Salt Security launches Pepper, an AI-powered assistant for API security

April 3, 2024
Pepper has been incorporated directly into the Salt dashboard, allowing users to find resources and launch in-product walk-throughs easily.
Crowdstrike Sundry Photography Adobe
Cybersecurity

Salt Security strengthens CrowdStrike partnership with new integration

Sept. 19, 2023
Available on the CrowdStrike Marketplace, the new integration delivers robust API threat intelligence and enhanced cross-organization API security functions.
Byw A2j8q3 0 0 1200 960 0 X Large
Cybersecurity

Salt Security appoints Ori Bach as Executive Vice President of Product

July 31, 2023
With more than 15 years of experience leading product strategy at technology companies, Bach will define product vision and oversee the global product team, driving product roadmaps...
Oip (2)
Security Executives

Global CISO survey: digital-first economy introduces unforeseen risks for 89% of CISOs

June 21, 2023
Today's digital-first economy has transformed the role of the modern CISO, increasing threats and changing security priorities.

Request More Information

By clicking above, I acknowledge and agree to Endeavor Business Media’s Terms of Service and to Endeavor Business Media's use of my contact information to communicate with me about offerings by Endeavor, its brands, affiliates and/or third-party partners, consistent with Endeavor's Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the resource, so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them. You may unsubscribe at any time.

All content from Salt Security

Cybersecurity

Salt Security enhances API security platform with OAuth protection package

April 25, 2024
These innovations will empower organizations to identify and mitigate malicious attempts to exploit OAuth flows, ultimately safeguarding sensitive data and user accounts.