Quantcast
Browsing all 41 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Understanding The Need For Zero-Trust Architecture

If you have worked in a corporate environment for a while, you have probably witnessed your internal IT network slowly become more dispersed over the years. Most enterprises have moved many resources...

View Article


Using OWASP’s crAPI Tool For API Security

As the modern web becomes ever more complex, the number of web vulnerabilities, and their complexities, have only intensified the need for developers to have a toolset designed for education and...

View Article


The State of API Standardization in Finance

Global finances were already heavily leaning toward digitization before the COVID-19 pandemic. Logistical issues in the wake of social distancing, supply chain disruption, and a massive rise in...

View Article

Automating API Security: SAST, DAST, and XDR

API security applies security best practices to secure web APIs, which are widely used in modern applications. API security includes access control, data privacy protection, and the detection and...

View Article

8 Significant API Breaches of Recent Years

API breaches are a major security problem. According to a recent survey, 41% of organizations have experienced an API security incident in the last year. A different survey reports that API security...

View Article


What Does API Security Mean in the Modern Threat Environment?

Application programming interfaces (APIs) are like connective tissues between applications and data sources that allow businesses to connect with their partners or users. They make it easier for...

View Article

What Is the Principle of Least Privilege?

This is the age of the data breach. According to cybersecurity advocate DataProt, 68 records are lost or stolen each second, generating an average data breach cost of $3.92 million. Data breaches are a...

View Article

Insider Threats and API Security: Key Issues to Consider

Insider threats and API security issues are two of the most significant dangers to modern organizations. Between June and December 2022, API attacks rose by 400%, while recent research found that 74%...

View Article


Image may be NSFW.
Clik here to view.

Beware OAuth Misconfigurations to Protect Your Web APIs

When we discuss security failures, we often think of them as a single isolated problem — after all, a lock either works or is broken, right? The simple fact is that’s not true — just as a bad lock is...

View Article


The State of GraphQL Security in 2024

GraphQL is a very popular paradigm for APIs requiring complex interaction and variable surfacing, and for a good reason — it is perhaps the most powerful tool for complex syntactic interconnective...

View Article

What’s The Difference Between Shadow APIs and Zombie APIs?

Shadow APIs and zombie APIs are, unfortunately, all too common. While they have cool names, their impact on organizations, data security, and user privacy is very uncool, threatening proper security...

View Article

How To Find And Protect Sensitive Data In APIs

Data is the primary fuel that powers the modern internet. APIs require data to communicate and deliver the fantastic benefits we have seen in the modern internet. However, this data is not just simple...

View Article

What Is Decentralized Identity?

Imagine this scenario: you recently filled out a job application online that requests your cell number for verification purposes. Next thing you know, you’re getting text messages from unsolicited...

View Article


Why APIs Need Better Identity and Access Management

We’ve all been there: clicking around a website or app when suddenly we stumble across a screen full of data that makes us think, “I don’t think I’m supposed to be able to see this.” In most cases,...

View Article

The Importance of API Security in DevOps

Application programming Interfaces (APIs) help software components and services integrate seamlessly within the DevOps environment. They help ensure a seamless collaboration between development and...

View Article


How APIs Can Empower Users to Manage Their Digital Footprint

Data protection used to be viewed majorly as an understanding of the legal requirements — something that was appreciated but not deemed very significant for any business. Today, however, that mentality...

View Article

API Misconfigurations Can Easily Expose Sensitive Data

APIs are incredibly powerful. They offer a way for systems to talk with one another, opening a world of collaborative, cross-functional solutions. These systems are also incredibly ubiquitous, with...

View Article


Implementing Zero Trust to Improve API Security

Application programming interfaces (APIs) are the essential building blocks that transform how organizations drive innovation, modernize their infrastructure, and connect with customers and partners. A...

View Article

How to Add SSL/TLS Encryption to APIs

Treblle’s Anatomy of an API 2024 report revealed a disturbing trend. Despite existing for over 30 years, only 45% of API developers use HTTPS to send or receive data. To make matters worse, that’s down...

View Article

Image may be NSFW.
Clik here to view.

Securing Cloud-Native Workloads With SPIFFE and SPIRE

When it comes to the modern API landscape, identity is a critical element of machine-to-machine communication. Being able to identify a source and destination machine in a flow allows for trusted and...

View Article
Browsing all 41 articles
Browse latest View live