Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December 2022

Announcing Release 3.5

We’re excited to announce the release of 3.5, the latest set of additions and enhancements to the Noname API Security Platform. Noname’s research & development team – the largest of its kind dedicated to API security – is constantly improving the Noname Platform with new releases made available to customers every few weeks.

Noname Security, API Security Company, Joins the OpenAPI Initiative

The OpenAPI Initiative is announcing today that Noname Security has joined as a new member. Welcome! According to recent research commissioned by Noname Security, API Security Trends in 2022, 76% of those surveyed reported they had experienced an API security incident in the past 12 months. Noname covers API security across three pillars: posture management, runtime security, and API security testing.

Tomorrow's Wordle Is "PWNED"!

Like many competitive families around the world, my family became avid Wordle players shortly after it was released. Then one day out of nowhere, Grandma announced an ironclad approach for consistent success. She explained that by using two devices, you could solve the puzzle on one, and use the other device to submit the winning solution with fewer tries. This would almost guarantee a victory over the rest of the family.

Find and Fix API Vulnerabilities Before They're Exploited

Noname Security just released the new Recon module in our API security platform. With Recon, you can search for exploitable intelligence just like the hackers do and identify the attack paths available to cybercriminals. Recon uncovers every public API, domain, and vulnerability so you can find critical issues like: API keys and credentials leakages API code & schema exposure API infrastructure misconfigurations and other vulnerabilities in documentation, including GitHub repos and Postman workspaces

DoD Identifies API Security as Critical for Zero Trust

The opening line of the newly published Department of Defense (DoD) Zero Trust Strategy should be a warning to all: “Our adversaries are in our networks, exfiltrating our data, and exploiting the Department’s users.”1 Numerous users and devices across geographic boundaries, various hardware and software supply chains, internal and external facing applications, sophisticated malicious actors, and sensitive data that moves easily as electrons certainly present challenges for cyber defen

Forrester Identifies API Security as an Important Technology Category in a Zero Trust Architecture

The global research firm, Forrester, recently published its latest Forrester Tech Tide™(1) focused on twenty technologies that underpin Zero Trust threat prevention. By analyzing business value and maturity of each technology , Forrester zeroed in on six in which they recommended businesses invest.