Blog

API Security

API Security Checklist: Part 3

API Security Checklist: Part 3 This is the final blog in the series outlining 15 best practices for strengthening API security with a shift-left approach. If you haven’t had a chance to read the …

Read More
API Security

APIs – Underpinning Modern Technologies to Popular Data Breaches

APIs – Underpinning Modern Technologies to Popular Data Breaches In today’s world software is an essential piece driving digital transformation and also business value for …

Read More →
API Security

OWASP API Security Top 10 – Broken Object Level Authorization

OWASP API Security Top 10 – Broken Object Level Authorization Broken Object Level Authorization (BOLA) is the top most in the list of OWASP Top …

Read More →
API Security

API Security Checklist: Part 2

API Security Checklist: Part 2 We continue the journey on understanding the best practices applicable towards secure application development, enforced through an API specification. In …

Read More →
API Security

How a Trusted Client Hides API Vulnerability?

How a Trusted Client Hides API Vulnerability? A Case for Service Side Monitoring/Testing A critical vulnerability in Apple “Sign Me In” feature was reported last …

Read More →
API Security

API Security Checklist: Secure API Design

API Security Checklist: Secure API Design Adopting a Shift-left Approach Securing API Endpoints is critical for securing applications. This requires security products to monitor a …

Read More →
API Security

Data Leaks When API Services Miscommunicate

Data Leaks When API Services Miscommunicate How Monitoring All Call Traces Can Detect and Prevent Data Exfiltration Findadoctor.com Data Leakage It was reported that information …

Read More →