San Antonio API Security Summit 2025 に参加しよう!
San Antonio API Security Summit 2025 に参加しよう!
San Antonio API Security Summit 2025 に参加しよう!
San Antonio API Security Summit 2025 に参加しよう!
San Antonio API Security Summit 2025 に参加しよう!
San Antonio API Security Summit 2025 に参加しよう!
閉じる
プライバシー設定
ウェブサイト運営に必要なCookieや類似技術を使用しています。追加のCookieは貴社の同意がある場合のみ利用されます。同意は「Agree」をクリックすることでいただけます。どのデータが収集され、どのようにパートナーと共有されているかの詳細は、Cookieポリシープライバシーポリシーをご確認ください。
Cookieは、貴社デバイスの特性や、IPアドレス、閲覧履歴、位置情報、固有識別子などの特定の個人情報を取得、解析、保存するために使用されます。これらのデータは様々な目的で利用されます。分析Cookieによりパフォーマンスを評価し、オンライン体験やキャンペーンの効果向上に役立てます。パーソナライズCookieは、利用状況に応じた情報やサポートを通じ、貴社専用の体験を提供します。広告Cookieは、第三者が貴社のデータをもとにオーディエンスリストを作成し、ソーシャルメディアやネット上でのターゲット広告に使用します。貴社は各ページ下部のリンクから、いつでも同意の許可、拒否、または撤回が可能です。
ご送信ありがとうございます。内容を受け付けました。
申し訳ありません。フォーム送信時にエラーが発生しました。

march 23-26 | Booth 3125

Visit Wallarm’s Booth and the Cyber Security Museum

Step into the museum.
Leave with your API Security Report Card.

APIs are the fastest-growing attack surface in modern applications. As cloud, microservices, and AI adoption accelerate, attackers are using APIs to reach your most sensitive systems.Visit Wallarm’s Cyber Security Museum to see what actually stops API attacks and what no longer belongs in production. Learn how to block and defend API threats, not just detect them, and get practical insight from Wallarm’s API security experts.

Stop by Booth 3125 to explore the exhibit and get a clear view of your API security posture.

Enigma Machine

This electro-mechanical rotor cipher device was used by Nazi Germany to encrypt military communications. Thought unbreakable, it was eventually cracked by Alan Turing’s team at Bletchley Park — proving that complexity is no substitute for resilience.

TBY-8 Radio

Used by Navajo Code Talkers to transmit secure messages during WWII. The Navajo language's complexity, including its unwritten nature, tonal qualities, and unique syntax, made it virtually impossible for the Japanese to decipher. The Navajo Code Talkers ensure message confidentiality and integrity at speed to support critical operations, a role that secure APIs play today.

2600 Magazine

A legendary publication born in the early computer underground, 2600 gave voice to hackers, phreakers, and digital explorers. It championed curiosity and open access—values that echo today in open-source security research and API vulnerability disclosure.

Blackberry 850

The first widely adopted mobile email device brought encrypted corporate communication into pockets everywhere — but also opened a new frontier of remote-access vulnerabilities and mobile API exposure.

Scytale Cipher

This cylindrical tool was used by the Spartans to transmit secret military commands. A strip of parchment wrapped around the rod would reveal a hidden message, unreadable unless wound around a rod of identical diameter — an early example of key-based encryption.

Rosetta Stone

This granodiorite stele, inscribed in three scripts — Greek, Demotic, and hieroglyphics — enabled scholars to decode ancient Egyptian writing. It’s a symbol of language translation and interoperability — the same challenges modern APIs face across platforms and systems.

Caesar Cipher

Attributed to Julius Caesar, this shift cipher replaced each letter with one a fixed number of places down the alphabet. Though simple, it represents one of the earliest known forms of algorithmic encryption — and the enduring principle that obfuscation alone is not security.

Norton Antivirus

Packaged AV software became a household name — but it couldn’t protect against logic abuse or custom API attacks. It represents the limits of file-based scanning in a post-signature world.

Enigma Machine

This electro-mechanical rotor cipher device was used by Nazi Germany to encrypt military communications. Thought unbreakable, it was eventually cracked by Alan Turing’s team at Bletchley Park — proving that complexity is no substitute for resilience.

TBY-8 Radio

Used by Navajo Code Talkers to transmit secure messages during WWII. The Navajo language's complexity, including its unwritten nature, tonal qualities, and unique syntax, made it virtually impossible for the Japanese to decipher. The Navajo Code Talkers ensure message confidentiality and integrity at speed to support critical operations, a role that secure APIs play today.

2600 Magazine

A legendary publication born in the early computer underground, 2600 gave voice to hackers, phreakers, and digital explorers. It championed curiosity and open access—values that echo today in open-source security research and API vulnerability disclosure.

Blackberry 850

The first widely adopted mobile email device brought encrypted corporate communication into pockets everywhere — but also opened a new frontier of remote-access vulnerabilities and mobile API exposure.

Scytale Cipher

This cylindrical tool was used by the Spartans to transmit secret military commands. A strip of parchment wrapped around the rod would reveal a hidden message, unreadable unless wound around a rod of identical diameter — an early example of key-based encryption.

Rosetta Stone

This granodiorite stele, inscribed in three scripts — Greek, Demotic, and hieroglyphics — enabled scholars to decode ancient Egyptian writing. It’s a symbol of language translation and interoperability — the same challenges modern APIs face across platforms and systems.

Caesar Cipher

Attributed to Julius Caesar, this shift cipher replaced each letter with one a fixed number of places down the alphabet. Though simple, it represents one of the earliest known forms of algorithmic encryption — and the enduring principle that obfuscation alone is not security

Norton Antivirus

Packaged AV software became a household name — but it couldn’t protect against logic abuse or custom API attacks. It represents the limits of file-based scanning in a post-signature world.

Get Your API Report Card at the Show

Sign up for a free API Security Report Card during the conference. Tell us which domain to assess and we will run the scan and deliver a clear, actionable breakdown on areas to focus on your API Security strategy. 

Your report includes:

External API attack surface discovery

API leak identification

Continuous vulnerability detection

WAF coverage testing

See how your APIs score and where to improve.

Join us for dinner

If the show floor isn’t your thing, or you just want to take advantage of the amazing restaurants in Vegas, join Wallarm for an executive dinner. We’ll be hosting exclusive dinners with our executives on Tuesday August 5, Wednesday August 6, and Thursday August 7. Request a seat at the table now.

Request a Seat

Wallarmを試そう!

今年のRSA 2024に参加されない場合も、無料で30日間のトライアルをお試しいただけます。アプリセキュリティプログラムを今すぐ強化してみませんか?数分でアプリとAPIの可視化を実現し、クラウドネイティブのスケーラブルな導入で即時検知・対策が可能になります。