Blog

API Threat Protection

OWASP API Security Top 10 – Excessive Data Exposure

OWASP API Security Top 10 – Excessive Data Exposure This week we look at the third item in the list of OWASP API security top 10 Excessive Data Exposure. Descriptions of other OWASP API …

Read More
  • All
  • Announcements
  • API Threat Protection
  • How-To
  • Vision
Untitled design (7)
API Threat Protection

API Security Checklist: Cheatsheet

API Security Checklist: Cheatsheet Over the last few weeks we presented a series of blogs [1][2][3] outlining 15 best practices for strengthening API security at …

Read More →
Untitled design (5)
API Threat Protection

OWASP API Security Top 10 – Broken Authentication

OWASP API Security Top 10 – Broken Authentication Let us dive into the second item in the OWASP API Top 10 list: Broken Authentication. In …

Read More →
Checklist part 3 blog image
API Threat Protection

API Security Checklist: Part 3

API Security Checklist: Part 3 This is the final blog in the series outlining 15 best practices for strengthening API security with a shift-left approach. …

Read More →
photo-1550645612-83f5d594b671
API Threat Protection

APIs – Underpinning Modern Technologies to Popular Data Breaches

APIs – Underpinning Modern Technologies to Popular Data Breaches In today’s world software is an essential piece driving digital transformation and also business value for …

Read More →
photo-1513082325166-c105b20374bb
API Threat Protection

OWASP API Security Top 10 – Broken Object Level Authorization

OWASP API Security Top 10 – Broken Object Level Authorization Broken Object Level Authorization (BOLA) is the top most in the list of OWASP Top …

Read More →
pexels-photo-416322
API Threat Protection

API Security Checklist: Part 2

API Security Checklist: Part 2 We continue the journey on understanding the best practices applicable towards secure application development, enforced through an API specification. In …

Read More →