Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API

API Management: Using Runtime API Security to Enhance API Lifecycle Processes

As I look at the range of API Management approaches that are recommended by various analysts, pundits, and vendors, I find it interesting that most don’t really know how to address “security” in the context of API management. In high-level API lifecycle management diagrams securing APIs is rarely called out visually, although it may be addressed briefly in an accompanying paragraph.

CISO: Top 10 Trends for 2024

I recently hosted and moderated a distinguished panel of Chief Information Security Officers (CISOs) - Nitin Raina, CISO at ThoughtWorks, Mike Wilkes, former CISO at Marvel and Yogesh Badwe, CSO at Druva. We discussed major trends for 2024 across an array of topics including the evolving threat landscape, recent regulations, data privacy considerations, securing product and critical infrastructure.

What is Rate Limiting? - Definition, Methods, and Why It Is Important

Rate limiting is a mechanism used to control the amount of data or requests that can be transmitted between two systems within a specified time period. It helps prevent abuse, protect system resources, and ensure fair usage for all users. By implementing rate limiting, organizations can mitigate the risk of server overload, improve network performance, and enhance overall security.

What is API Abuse? | Noname Academy

Modern application programming interfaces (APIs) offer a great example of the law of unintended consequences. With their openness and ability to offer nearly universal connectivity between applications and data sources, they have transformed IT and the businesses that deploy them. However, that same openness also makes APIs ripe targets for abuse.

What is an Attack Surface? - Defining, Identifying, and Mitigating Cyber Risks

Attack surface management refers to the process of identifying, assessing, and managing the potential vulnerabilities in an organization’s technology infrastructure. It involves analyzing and understanding all possible entry points that attackers could exploit, such as network devices, applications, APIs, and user access points.

What is Data Security? - Definition and Implementation

Data security refers to the measures and practices implemented to protect sensitive information from unauthorized access, use, disclosure, disruption, modification or destruction. It involves various techniques and technologies such as encryption, access controls, firewalls, antivirus software, secure backups, and employee training.

What is API Authentication?

API authentication is a combination of technology and process that proves or verifies the identities of users who want access to an API. Specifically, API authentication involves the use of a software protocol to verify that users are who they claim to be when a client makes an API call. API authentication solutions are usually set up to block access to an API if they detect something wrong with the user’s identity during the API call. It’s online verification of ID, a gatekeeping countermeasure that defends APIs from access by malicious actors. Remember, too, that in many cases, the API user is a machine, not a person.