The Art of Deception: Luring Hackers With API Honeypots
In API security, a strong offense is… a carefully crafted illusion. We obsess over API firewalls and authorization, but what if we took a more clever approach? We spend so much time building barriers,...
View ArticleBehind ‘Cloud Native Data Security with OAuth’: Highlights from the Authors
Cloud Native Data Security With OAuth We recently spent over a year writing a consumer-focused book on the big picture of modern application security. O’Reilly has now published the book, Cloud Native...
View ArticleHow APIs Should Respond to Data Sovereignty
Countless country-specific data privacy and handling laws have emerged on the tech scene in recent years. GDPR, CCPA, and others demand strict adherence, complicating operations for...
View Article10+ Data Regulations All API Developers Should Know About
For too long, as soon as they were able to do so, businesses took the following approach to gathering data: ‘Harvest what we can now, and figure out what we’re going to do with it later.’ The concept...
View Article5 Random API Key Generators (And Why You Might Use Them)
API keys are a staple of API development, offering a methodology to identify traffic sources and interactions. Sometimes, however, you need API keys for reasons that aren’t consistent or repeatable —...
View Article