An Intellyx Brain Candy Brief
BLST Security analyzes API traffic to uncover broken business logic that can lead to security vulnerabilities. It then maps the corresponding logic as messages traverse the infrastructure in order to provide analysts with searchable data about such vulnerabilities.
BLST primarily focuses on HTTP interactions, where attackers might compromise misconfigurations or other vulnerabilities to change parameter values in POST or GET data in requests or responses. BLST will be adding other protocols over time.
BLST then provides a connectivity map that affords analysts the ability to drill down into individual message parameters and responses, as well as giving them an indexable and searchable table they can filter and study.
Copyright © Intellyx LLC. Intellyx publishes the Cloud-Native Computing poster, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article is an Intellyx customer. To be considered for a Brain Candy article, email us at pr@intellyx.com.