Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2024

How Mergers & Acquisitions Are Leaving Your APIs Vulnerable #apiattacks #apimanagement #api

Mergers and acquisitions can expose critical API vulnerabilities, often overlooked due to poor documentation and lack of standardization. Learn about the hidden risks that can lead to delayed incident response and compromised security during M&A processes.

A Maturity Model to Secure Mulesoft Environments

In today’s rapidly evolving digital landscape, where application programming interfaces (APIs) are becoming the backbone of technology infrastructure, the need for robust management and security measures have never been more critical. With the surge in API use and the corresponding increase in threats, protecting Mulesoft environments has become a top priority.

Deep Dive into the Latest API Security Vulnerabilities in Envoy

Envoy has carved out a critical role in cloud-native computing, becoming increasingly prevalent as the default ingress controller for Kubernetes. This high-performance proxy, developed by Lyft and now part of the Cloud Native Computing Foundation’s arsenal, is integral for companies scaling up their Kubernetes deployments. Envoy ensures efficient load balancing, security, and operational agility by managing external access to services within Kubernetes clusters,.

70-83% of All Internet Traffic is API Traffic! #api #traffic #internettrends

Did you know that 70-83% of all internet traffic consists of API calls? In today's interconnected world, APIs are the invisible backbone driving your favorite apps, from maps to messaging platforms. This video breaks down the significance of API traffic and how it shapes the way we interact with technology daily. Discover why APIs are more critical than ever and how they power the digital experiences we rely on.

Chicago API Security Summit 2024

Earlier this week we had the pleasure of hosting a regional API Security Summit in Chicago (well, actually in Lombard). These summits bring together the local cybersecurity community for half-day of API Security-focused content, including expert speakers and panelists. While this isn’t the first time we’ve organized an event like this, it was memorable for the quality of content and participants.

Fundamentals of GraphQL-specific attacks

Developers are constantly exploring new technologies that can improve the performance, flexibility, and usability of applications. GraphQL is one such technology that has gained significant attention for its ability to fetch data efficiently. Unlike the traditional REST API, which requires multiple round trips to the server to gather various pieces of data, GraphQL allows developers to retrieve all the needed data in a single request.

Twilio Breach: 33M Phone Numbers Exposed #apiattacks #apisecurity #dataleaks #databreach #twilio

A major security breach at Twilio exposed 33 million phone numbers due to an unauthenticated API. Watch this video to understand the risks and learn essential API security practices to protect your organization from similar threats.

A CISO'S View on Building an API Security Program in 2024

Building a robust API and application security program is essential for security leaders across all industries. However, creating and maintaining an effective security strategy for your APIs and web applications requires: Identifying the right components to build a program that aligns with your business objectives.

How Wallarm API Security Platform Works: Key Features Explained #apisecurity #cybersecurity #api

Get an inside look at how the Wallarm API Security Platform operates to protect your APIs. Learn about its key features, including API Discovery, real-time protection, and traffic analysis, and how it helps you stay ahead of API threats.

Wallarm Innovation Update: Effective API Protection With GraphQL And API Policy Enforcement

With its exceptional ability to improve application flexibility, performance, and user experience, GraphQL is rapidly becoming one of the most widely adopted API protocols, with Gartner predicting that by 2025 it will be implemented by over 50% of enterprises. However, the same flexibility that makes GraphQL such an attractive protocol, however, also makes it susceptible to a variety of unique attacks.

A CISO's View on the State of API Security: Discussing the API ThreatStats Report, Q2 2024

API exploits represent one of the fastest growing threat vectors–a trend that will continue to accelerate as the increasingly AI-driven digital economy grows. Join veteran CISO and application security expert Mike Wilkes and Wallarm’s VP of Product, Tim Erlin, as they discuss the state of API security and where it is heading. Drawing upon their extensive industry experience as well as insights drawn from the Wallarm API ThreatStats Report Q2, 2024.

A CISO's Checklist For Securing APIs And Applications

Building a robust API and application security program is a key objective for security leaders in any market. But developing and maintaining an effective security program for your APIs and web applications requires: ‍- A deep understanding of the right approach to implementing API and application security.

API Attack Surface: How to secure it and why it matters

Managing an organization’s attack surface is a complex problem involving asset discovery, vulnerability analysis, and continuous monitoring. There are multiple well-defined solutions to secure the attack surface, such as extended detection and response (EDR or XDR), security information & event management (SIEM), and security orchestration, automation & response (SOAR); despite that, these tools often do not prioritize APIs.