Tag: apis
The Types of API Attacks We Are Seeing
Attackers are like modern-day cartographers. The cartographers of old weren’t necessarily sailing...
VIEW MOREHow Attackers Are Using Bots to Breach APIs
APIs have become very popular attack targets, and almost all the attacks we see against API...
VIEW MOREExcessive Data Exposure: What It Is, How We Can Help
2023 UPDATE: In the 2023 OWASP API Top 10 vulnerabilities list, Excessive Data Exposure and Mass...
VIEW MOREDiscovering and Protecting GraphQL APIs
What’s the difference between GraphQL and REST API endpoints? GraphQL is a structured...
VIEW MORESmarter Not Harder: 3 Ways API Analytics Can Help Application Owners
Software development is fraught with risk — misunderstood requirements, rapidly evolving...
VIEW MOREBroken Authentication: What It Is, How We Can Help
No. 2 on the 2023 OWASP Top 10 List of Critical API Security Risks, broken authentication is both a...
VIEW MOREOpen Banking Forcing Prioritization of API Protection
Growth of Open Banking Open Banking Project is an open-source system that allows financial...
VIEW MOREHow Not to Protect APIs From Attack
It has been a couple of weeks since the return of RSA Conference to San Fran’s Moscone Center....
VIEW MOREHow to Use API Schema to Improve API Protection
What Is an API Schema? The RESTful API design pattern is in use by an overwhelming majority...
VIEW MOREWhy the Long View Matters in API Attack Protection
In API attack protection, context is key. The old-school method of looking for attack signatures...
VIEW MOREWhat is BOLA – Broken Object Level Authorization?
No. 1 on the 2023 OWASP Top 10 List of Critical API Security Risks, broken object level...
VIEW MOREGet API Protection Best Practices With “The Definitive Guide to API Attack Protection”
In recent months, we’ve been fielding a lot of questions about API security from our prospects...
VIEW MORE