Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API

What is Identity and Access Management (IAM) - Definition and Importance

Identity and Access Management (IAM) provides a critical, foundational element of cybersecurity, which is the tracking of who users are and what each user is entitled to do in a digital environment. People tend to think of IAM as a solution, but it’s actually a framework that serves as the basis for solutions, along with a range of work processes.

What is a SOAP API - Definition, Examples, and Security Considerations

Simple Object Access Protocol, better known as SOAP, is a standards-based messaging protocol specification. Introduced in 1998, SOAP and a handful of other web standards became the foundation for a generation of enterprise technologies. SOAP APIs are especially handy when it’s necessary for a server and client to exchange data in a structured format, as SOAP messages are built in extensible markup language (XML).

API Predictions for 2024

Is Salt Security a fortune teller? We’re not sure if we’d go as far as to say that, but we certainly have had our fair share of precognitive moments. In today’s virtual age where everyone is utilizing and relying on digital landscapes, people’s data is constantly being put online. As technology advances and more people go online, bad actors and cyber threats use vulnerabilities in Application Programming Interfaces (APIs) to get access to sensitive data.

Empowering Security Champions with Modern Static Application Security Testing (SAST)

Over the past two decades, as organizations have increasingly strived to integrate security into their development processes, the role of Security Champions has evolved from an informal position to one of strategic importance. They are now responsible for prioritizing security in their projects, leveraging powerful tools like Static Application Security Testing (SAST) to achieve this goal.

Addressing the Rising Threat of API Leaks

In the realm of cybersecurity, the metaphor of "Leaky Buckets" has become an increasingly prevalent concern, particularly in the context of API security. This term encapsulates the hidden vulnerabilities and exposures in API infrastructures that many organizations struggle to identify and address. The digital era has amplified these challenges, with APIs becoming central to the operational fabric of numerous enterprises.

The Darkside of GraphQL

GraphQL is a query language for APIs that provides a powerful and efficient way to query and manipulate data. As powerful and versatile as GraphQL is, its downside is that it can be vulnerable to certain security threats. In this presentation, we will discuss the security vulnerabilities associated with GraphQL, from the basics to more advanced threats, and how to best protect against them. After this presentation, attendees will have a better understanding of security vulnerabilities in GraphQL, as well as an understanding of the steps needed to protect against them.