Data Theorem Showcasing Hacker Toolkits at Black Hat USA 2021

Data Theorem, a leading provider of modern application security, and a Double Platinum 2020 ‘ASTORS’ Award Winner recently nominated to compete in the 2021 ‘ASTORS’ Awards Program, announced that its acclaimed AppSec solutions will be showcased in a free advanced security training session during Black Hat USA 2021.

Data Theorem’s AppSec experts will host the training session titled “GraphQL DDoS and OTP Bypass Attacks”, to be held on August 4, 2021 at 11:00 am PDT/2:00 pm EDT.

Data Theorem, is recognized for its unique dynamic and run-time analysis with offensive attack surface management and defensive protection toolkits, and their unique solutions are differentiated in enabling organizations to conduct continuous, automated security inspection and remediation of their most important cloud-native applications.

Data Theorem’s latest offering, Cloud Secure, which has been nominated for Best Breach & Attack Simulation (BAS) Platform in the 2021 ‘ASTORS’ Awards, is the industry’s first solution delivering attack surface management security for cloud-native applications that starts at the client layer (mobile and web), protects the network layer (REST and GraphQL APIs), and extends down through the underlying infrastructure (cloud services).

Cloud Secure’s combination of attack surface management and defensive protections enables both offensive and defensive security capabilities to best prevent data breaches of cloud-native applications and serverless cloud functions.

Cloud Secure

For cloud security, application & infrastructure teams need the capability to address issues simultaneously using a full stack approach, from cloud infrastructure to cloud applications.

Data Theorem’s Cloud Security product is CSPM + AppSec all-in-one:

  1. Monitor your Cloud configs (CSPM), applications, microservices, serverless functions, key stores/keyvaults, Virtual Machines, Storage assets, Databases, etc.

  2. Hack the Cloud on a daily basis in search of security vulnerabilities that can lead to data breaches

  3. Protect the Cloud by preventing data breaches sourced from Cloud assets and configs.

Close your Cloud Security Gaps Monitor your Cloud configs, apps, microservices, serverless functions, key stores/key vaults, virtual machines, storage assets, databases, and more.
Close your Cloud Security Gaps
Monitor your Cloud configs, apps, microservices, serverless functions, key stores/key vaults, virtual machines, storage assets, databases, and more.

Data Theorem’s Cloud analyzer continuously discovers vulnerabilities in multi-cloud environments and provides mitigation solutions in real time.

As companies expand their global and cloud footprints, security teams are seeking new solutions to discover, inspect, and remediate their greatest internet-facing risks.

This helps lock in stronger visibility across all modern apps and APIs, preventing data breaches.

Attack Surface Management extends beyond manual pen testing to provide a view into dangerous misconfigurations and process failures that can allow attackers easy access into cloud or web apps, or allow access to valuable data.

(Watch as Doug Dooley, COO at Data Theorem, provides analysis on the future of cloud security. Doug explains how Data Theorem’s newest product, Cloud Secure, expands beyond CSPM’s protection of infrastructure and network to a more app-centric approach to protect core assets like code and serverless functions through offensive and defensive toolkits. Courtesy of Data Theorem and YouTube.)

How does Data Theorem do it?

  • Blackbox Discovery: No agents, configuration, or maintenance. Just continuous monitoring.

  • Attack Toolkits: Attack your AppSec stack just like a true adversary.

  • Prioritized Alerts: Separate critical alerts that need immediate attention from those that are more time consuming.

  • Actionable Findings: Reporting is available 24/7 and clearly details steps to remediation.

  • Easy Integrations: Make it easy to collaborate, for shared visibility and ownership.

Doug Dooley, Chief Operating Officer at Data Theorem
Doug Dooley, Chief Operating Officer at Data Theorem

“Cloud Secure joins Data Theorem’s portfolio of award-winning AppSec solutions,” explained Doug Dooley, Data Theorem COO.

“Our hacker toolkits continue to showcase cloud-native application attack insights, which we will demonstrate in our upcoming GraphQL DDoS and OTP Bypass Attacks session during Black Hat.”

“We are pleased to offer this free advanced security training opportunity to help educate the security research community on some of today’s modern AppSec attacks, and prevention techniques.”

For more information and to register for Data Theorems “GraphQL DDoS and OTP Bypass Attacks” at Black Hat 2021, go to

Data Theorem’s API Secure was also nominated for Best Vulnerability Management in the 2021 ‘ASTORS’ Awards Program.

API Secure

A common frustration for distributed teams is that many security tools are limited in function and only allow one user to have insights into vulnerability management and control over resolving them.

For API security, application and infrastructure teams will need to address issues simultaneously.

Data Theorem’s automated security tools are solving these challenges by enabling clients custom access for different, designated roles.

  • For example, an infrastructure engineer would be provided access to all results, can invite new users to the portal, access compliance reporting, and can close any issue at any time.

Go Beyond Securing the Perimeter Identify the most critical vulnerabilities across all of your native and third-party APIs, triage leaky data & auto-remediate before exposure.
Go Beyond Securing the Perimeter
Identify the most critical vulnerabilities across all of your native and third-party APIs, triage leaky data & auto-remediate before exposure.
  • As compared to a security user who would have access to zero apps by default, but must be provided access to all security monitoring. The security user would have the capabilities to close issues at any time and access reporting 24/7, but has no other access beyond closing issues one-by-one.

  • Whereas a developer, would likewise be provided access to apps by default, but not given the access to close issues. The developer account would allow viewing of secure code and remediation summaries.

Data Theorem’s API Security product is designed to:

1. Inventory all your APIs
2. Hack your APIs
3. Remediate security issues within the CI pipeline

The analyzer engine continuously discovers vulnerabilities in multicloud/on-premise environments and provides critical alerts/remediation solutions in real time.

Companies must adopt a continuous approach to API Security, because as has been documented – that in many API breaches, the breached organization didn’t know about their API was unsecured – until it was too late.

(Take a deeper dive to learn how Data Theorem approaches API security, identifying your entire attack surface by discovering all APIs, hacking beyond the perimeter, and maintaining a superior security posture. Data Theorem empowers their customers with proactive ways to hack their APIs before attackers do. Courtesy of Data Theorem and YouTube.)

Data Theorem’s broad AppSec portfolio protects organizations from data breaches with application security testing and protection for modern web frameworks, API-driven microservices and cloud resources.

Its solutions are powered by its award-winning Analyzer Engine, which leverages a new type of dynamic and run-time analysis that is fully integrated into the CI/CD process, and enables organizations to conduct continuous, automated security inspection and remediation.

Data Theorem specializes in proactive security and goes beyond securing the perimeter to inventory, continuously monitor, and remediate shadow APIs, leaky data, and resolve storage configurations – resulting in a program designed to secure your data at every level.

(Data Theorem delivers automated security for DevOps, ushering in a new era of DevSecOps, to help teams grow faster with fewer application security exposures. Courtesy of Data Theorem and YouTube.)

Data Theorem is a leading provider of modern application security, with a core mission to analyze and secure any modern application anytime, anywhere.

Free eBook – API Security for Dummies

Data Theorem
Courtesy of Data Theorem

Learn how APIs have become the #1 most vulnerable attack vector for large-scale data breaches and how to empower your teams to automate and analyze security behind your apps, brought to you by Data Theorem. 

The Data Theorem Analyzer Engine continuously analyzes APIs, Web, Mobile, and Cloud applications in search of security flaws and data
privacy gaps. Data Theorem products help organizations
prevent AppSec data breaches.

To date, Data Theorem has detected more than 1 billion application eavesdropping incidents and currently secures more than 8,000 modern applications for its Enterprise customers around the world.

To Learn More, please visit, and

Data Theorem Returns to Compete in 2021 ‘ASTORS’ Homeland Security Awards Program

American Security Today’s ‘ASTORS’ Homeland Security Awards program is today in its Sixth Year and continues to recognize the Outstanding Innovations of top firms and agencies in the Homeland Security and Public Safety fields.

The Annual ‘ASTORS’ Awards is the preeminent U.S. Homeland Security Awards Program highlighting the most cutting-edge and forward-thinking security solutions coming onto the market today, to ensure our readers have the information they need to stay ahead of the competition, and keep our Nation safe – one facility, street, and city at a time.

Transportation Security Administration (TSA) Administer, David Pekoske
David Pekoske, Transportation Security Administration (TSA) Administer

American Security Today is pleased to announce TSA Administrator  David Pekoske, will join the organization as a featured speaker at the 2021 ‘ASTORS’ Homeland Security Awards Presentation Luncheon, on November 18, 2021 at ISC East in New York City.

“On the heels of an unprecedented global pandemic, continued unrest in our cities and potentially catastrophic cyberattacks on our nations critical infrastructure, the focus of the 2021 ‘ASTORS’ Awards Luncheon will be on the latest, state-of-the-art innovations that are driving investments in new public security and safety technologies and systems,” said AST Editorial and Managing Director Tammy Waitt.

“As a recognized expert in crisis management, strategic planning, innovation and aviation, surface transportation and maritime security, David Pekoske’s message highlighting his top priorities and challenges for the TSA based on his years of wide-ranging experience will be critical to our attendees internalizing the critical nature of these escalating challenges, and realizing innovative new approaches to meet them.”

The 2021 ‘ASTORS’ Awards Program is Proudly Sponsored by AMAROK and SIMS Software, along with Returning Premier Sponsors
ATI SystemsAttivo NetworksAutomatic Systems, and Reed Exhibitions.

Nominations are currently being accepted for the 2021 ‘ASTORS’ Homeland Security Awards at

Comprehensive List of Categories Include:

Access Control/ Identification Personal/Protective Equipment Law Enforcement Counter Terrorism
Perimeter Barrier/ Deterrent System Interagency Interdiction Operation Cloud Computing/Storage Solution
Facial/IRIS Recognition Body Worn Video Product Cyber Security
Video Surveillance/VMS Mobile Technology Anti-Malware
Audio Analytics Disaster Preparedness ID Management
Thermal/Infrared Camera Mass Notification System Fire & Safety
Metal/Weapon Detection Rescue Operations Critical Infrastructure
License Plate Recognition Detection Products And Many Others!
COVID Innovations And Many Others!


Don’t see a Direct Hit for your Product, Agency or Organization?

The World Health Organization (WHO) declared the 2019–20 coronavirus outbreak a Public Health Emergency of International Concern (PHEIC) on 30 January 2020 and a pandemic on 11 March 2020. Local transmission of the disease has occurred across all fifty states in the America.

With the unprecedented occurrence of the COVID-19 pandemic, the focus of the safety and security industries has realized the need to increase innovations to address the daily growing challenges.

As such AST aims to make sure these firms and professionals are reflected in the 2021 ‘ASTORS’ Awards Program, so we’d like to encourage you to submit appropriate categories recommendations and include COVID-19 Frontline Professionals in your Nominations to see that these Professionals, Facilities, and Vendors receive the Recognition they Deserve!

Submit your category recommendation for consideration to Michael Madsen, AST Publisher at:

Register for the 2021 ‘ASTORS’ Luncheon Today

2019 'ASTORS' Awards Program Banquet Luncheon
2019 ‘ASTORS’ Awards Program Banquet Luncheon

At ISC East 2021 you with the opportunity to interact with a broad array of security industry professionals.

ISC East works closely with other businesses in the security and public safety space to help bring together the Northeast’s largest security trade show each year.

In collaboration with premier sponsor SIA (Security Industry Association) and in partnership with ASIS NYC, ISC East is proud to work with and be supported by various associations, trade publications, charities, and more.

Therefore, the ISC audience of security dealers, installers, integrators, consultants, corporate, government and law enforcement/first responder practitioners will be joined by the ASIS NYC audience of major corporate managerial-through-director-level national and global security executives.

The combination of one-on-one conversations with the industry’s top innovators,  integrators and security executives, special events, high-quality education and training, and strong support from industry associations, will allow attendees to learn and evaluate solutions from leading security exhibitors and brands. 

The 2019 ‘ASTORS’ Awards Program surpassed expectations with a record number of nominations received from industry leaders and government agencies, and drew over 200 attendees to the ‘ASTORS’ Awards Presentation Banquet – an exclusive gourmet luncheon and networking opportunity which filled to capacity, before having to turn away late registrants.

Your ‘ASTORS’ Awards Luncheon registration includes complimentary attendee access to ISC East – Thank take advantage of this exclusive luncheon opportunity to take a break from the show – Invite your team, guests, clients and show visitors to a lovely and affordable plated meal event in the heart of New York City, for  a fabulous networking opportunity!

Go to to secure your seat or reserve a table.

***Limited space available so Register Today. There will be no on-site registrations.

Why American Security Today?

The traditional security marketplace has long been covered by a host of publications putting forward the old school basics to what is Today – a fast changing security landscape.

The traditional security marketplace has long been covered by a host of publications putting forward the old school basics to what is Today – a fast changing security landscape.

American Security Today is uniquely focused on the broader Homeland Security & Public Safety marketplace with over 75,000 readers at the Federal, State and local levels of government as well as firms allied to government.

American Security Today brings forward a fresh compelling look and read with our customized digital publications that hold readers eyes throughout the story with cutting edge editorial that provides solutions to their challenges.

Harness the Power of the Web – with our 100% Mobile Friendly Publications

AST puts forward the Largest and Most Qualified Circulation in Government with Over 75,000 readers on the Federal, State and Local levels.
AST puts forward the Largest and Most Qualified Circulation in Government with Over 75,000 readers on the Federal, State and Local levels.

The AST Digital Publications is distributed to over 75,000 qualified government and homeland security professionals in federal, state and local levels.


AST Reaches both Private & Public Experts, essential to meeting these new challenges.

Today’s new generation of public safety and security experts need real-time knowledge to deal with domestic and international terrorism, lone wolf attacks, unprecedented urban violence, shifts in society, culture and media bias – making it increasingly difficult for Homeland Security, Law Enforcement, First Responders, Military and Private Security Professionals to implement coordinated security measures to ensure national security and improve public safety.

American Security Today

These experts are from Government at the federal, state and local level as well as from private firms allied to government.

AST provides a full plate of topics in our AST Monthly Magazine Editions, AST Website and AST Daily News Alerts, covering 23 Vital Sectors such as Access Control, Perimeter Protection, Video Surveillance/Analytics, Airport Security, Border Security, CBRNE Detection, Border Security, Ports, Cybersecurity, Networking Security, Encryption, Law Enforcement, First Responders, Campus Security, Security Services, Corporate Facilities, and Emergency Response among others.

AST has Expanded readership into integral Critical Infrastructure audiences such as Protection of Nuclear Facilities, Water Plants & Dams, Bridges & Tunnels, and other potential targets of terrorism.

Other areas of concern include Transportation Hubs, Public Assemblies, Government Facilities, Sporting & Concert Stadiums, our Nation’s Schools & Universities, and Commercial Business Destinations – all enticing targets due to the large number of persons and resources clustered together.

To learn more about the 2020 ‘ASTORS’ Homeland Security Award Winners solutions, Check Out the New 2020 ‘ASTORS’ CHAMPIONS Edition Fully Interactive Magazine – the Best Products of 2020 ‘A Year in Review’.

The Annual CHAMPIONS edition includes a review of the ‘ASTORS’ Award Winning products and programs, highlighting key details on many of the winning firms products and services, includes video interviews and more.

It is your Go-To source throughout the year for ‘The Best of 2020 Products and Services‘ endorsed by American Security Today, and can satisfy your agency’s and organization’s most pressing Homeland Security and Public Safety needs.

From Physical Security (Access Control, Critical Infrastructure, Perimeter Protection and Video Surveillance Cameras and Video Management Systems), to IT Security (Cybersecurity, Encryption, Data Storage, Anti-Malware and Networking Security – Just to name a few), the 2020 ‘ASTORS’ CHAMPIONS EDITION has what you need to Detect, Delay, Respond to, and Mitigate today’s real-time threats in our constantly evolving security landscape.

It also includes featured guest editorial pieces from some of the security industry’s most respected leaders, and recognized firms in the 2020 ‘ASTORS’ Awards Program.

  • For a complete list of 2020 ‘ASTORS’ Award Winners, click here.

For more information on All Things American Security Today, and the 2021 ‘ASTORS’ Awards Program, please contact Michael Madsen, AST Publisher at

AST strives to meet a 3 STAR trustworthiness rating, based on the following criteria:

  • Provides named sources
  • Reported by more than one notable outlet
  • Includes supporting video, direct statements, or photos

Subscribe to the AST Daily News Alert Here.