Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API

Announcing: Code-free API log collection and parser creation

AT&T Cybersecurity is pleased to announce a code-free way for our USM Anywhere customers to make their own API-driven log collectors and custom parsers. This big advancement in threat detection and response technology will make it possible for customers to collect information from a much larger variety of sources and SaaS services without having to request new integrations or log parsers.

API authentication and authorization best practices

Learn about API authentication and authorization best practices to ensure your APIs are secure. While we often use the terms interchangeably, authorization and authentication are two separate functions. Authentication is the process of verifying who a user is, and authorization is the process of verifying what they have access to.

Comprehensive Risk-based API Protection

Comprehensive Risk-baed API Protection: Inappropriate API protection keeps your company at a high level of risk. AppTrana protects web apps and APIs by addressing advanced threats with absolute precision. Operating in a risk-based approach enables unparalleled visibility of how your web apps and APIs are attacked. Watch: How AppTrana discovers and automatically protects all digital touchpoints with WAAP Security.

Rubrik and GraphQL - Episode 4 - Powershell

Powershell is by far the most widely utilized SDK that Rubrik provides. While an SDK is currently under development to cover off everything Rubrik Security Cloud and GraphQL, this episode will show you how to make raw GraphQL API calls into the Rubrik platform using the infamous scripting tool. You will see how to form various queries and mutations within Powershell, and how to parse the returned responses - performing real-world automation scenarios with Powershell and Rubrik.

Rubrik and GraphQL - Episode 2 - GraphQL Queries

At the core of GraphQL lies the query. Queries allow us to fetch exactly the data we need from the Rubrik platform. This episode will dive into how we form basic queries to retrieve Rubrik objects for usage with automation. We’ll talk about how to form a query, create fragments, and pass data into our queries using variables.

Mend API Helps Make SBOMs Simple

The proliferation of third-party software components such as open source software(OSS) has triggered a growing need to keep track of it all. Why? Because when security vulnerabilities inevitably crop up in open source components, it’s pretty important to know whether your company uses that piece of code – or whether it appears in the myriad software dependencies inherent in open source.

Uncovering the scraper bots plaguing APIs

Most cyber threats — like credential stuffing and card cracking — are committed by fraudsters with the aim of stealing money, data, or both. The law is clear on these cyberattacks: online fraud is illegal. But unlike these overtly malicious threats, web scraping isn’t always illegal, or even unethical. Aggregator sites like travel agencies and price comparison websites use scraper bots to help customers find the best deals.

5 Misconceptions About API Security Testing for Mobile

The use of Application Programming Interface has skyrocketed with the rapid adoption of cloud, web, and mobile apps. Accordingly, API security testing has had to move into a completely different phase owing to the complexity as well as time and resource limitations. API testing involves testing the APIs directly, including their functionality, reliability, performance, and security.