Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API

Mitigate the primary risks to API security

APIs are foundational to modular application development. They support an organization’s internal services as well as provide a mechanism for customers to access certain services or datasets for their own applications. Because of the role that both internal and public-facing APIs play in applications, they are considered one of the top targets for threat actors.

Introducing Salt Security's New AI-Powered Knowledge Base Assistant: Pepper!

Going to a vendor's Knowledge Base (KB) is often the first place practitioners go to get the product deployed or troubleshoot issues. Even with advanced search tools, historically, KBs have been challenging to find relevant content quickly, and navigating a KB can be frustrating. At Salt Security, not only do we want to make your job of securing APIs easier, but we also want to make getting the guidance you need easier, friendlier and more efficient.

What is Business Logic? | Noname Security

Business logic refers to the set of rules that govern the behavior of a business. At its core, business logic is used in making decisions based on what makes sense for your company. Despite these benefits, business logic doesn’t come without risk as vulnerabilities if your applications rely on business logic to function.

What is Data Exfiltration? | Noname Security

Data exfiltration is the unauthorized transferring of data out of a secure environment, usually for malicious purposes. It’s improper exporting of data; a data breach that ends up with data in the wrong hands. One might say it’s a fancy word for stealing. Outsiders, employees, and contractors can exfiltrate data, but it is often difficult to detect until it’s too late.

Top 6 Data Breaches That Cost Millions

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.” - Tim Cook, CEO of Apple Inc. The entire digital landscape has evolved into a behemoth of sorts as the number of online attacks targeting individuals, businesses, and governments has risen steadily.

Astra Review - WireMock Platform Enhances API Security

WireMock is an API developer productivity platform that provides developers with the tools and technologies needed to get the job done easily when they depend on APIs in the development process. It allows developers to be productive when they're consuming 3rd party and internal APIs that delay their development or when they prototype and deliver APIs.

How to Comply with PCI DSS 4.0's API Security Requirements

Struggling to keep up with evolving regulations isn’t a new thing for IT security teams. After all, for every NIS, there’s a NIS2. But when you consider that 130+ global jurisdictions have enacted data privacy laws whose mandates change, it’s not surprising that only 9% of executives feel highly confident that they can meet all disclosure requirements.

Spoutible Enhances Platform Security through Partnership with Wallarm

Spoutible, the rapidly growing social media platform known for its commitment to fostering a safe, inclusive, and respectful online community, has taken a significant step forward in its mission to ensure user safety, security and data integrity. Recognizing the critical importance of robust API security in today’s digital age, Spoutible is excited to announce a strategic partnership with Wallarm, a leader in API and Application security.

Optimizing GitHub Actions with GitHub GraphQL API

GitHub Actions and the GitHub GraphQL API are powerful tools for automating and optimizing workflows. GitHub Actions, released in 2018 brings CI/CD directly into the GitHub ecosystem and automates general project management using YAML files. Whereas, a 2-year earlier-released GraphQL API provides a more efficient way to fetch and manipulate data.