Blog

  • All
  • Announcements
  • API Threat Protection
  • How-To
  • Uncategorized
  • Vision
Checklist part 3 blog image
API Threat Protection

API Security Checklist: Part 3

API Security Checklist: Part 3 This is the final blog in the series outlining 15 best practices for strengthening API security with a shift-left approach. …

Read More →
photo-1550645612-83f5d594b671
API Threat Protection

APIs – Underpinning Modern Technologies to Popular Data Breaches

APIs – Underpinning Modern Technologies to Popular Data Breaches In today’s world software is an essential piece driving digital transformation and also business value for …

Read More →
photo-1513082325166-c105b20374bb
API Threat Protection

OWASP API Security Top 10 – Broken Object Level Authorization

OWASP API Security Top 10 – Broken Object Level Authorization Broken Object Level Authorization (BOLA) is the top most in the list of OWASP Top …

Read More →
pexels-photo-416322
API Threat Protection

API Security Checklist: Part 2

API Security Checklist: Part 2 We continue the journey on understanding the best practices applicable towards secure application development, enforced through an API specification. In …

Read More →
Untitled design (6)
API Threat Protection

How a Trusted Client Hides API Vulnerability?

How a Trusted Client Hides API Vulnerability? A Case for Service Side Monitoring/Testing A critical vulnerability in Apple “Sign Me In” feature was reported last …

Read More →
checklist-1919328_1280
API Threat Protection

API Security Checklist: Secure API Design

API Security Checklist: Secure API Design Adopting a Shift-left Approach Securing API Endpoints is critical for securing applications. This requires security products to monitor a …

Read More →