Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Noname Security

Finding API Flaws Before Production

API flaws can cause several problems that can have negative consequences in production. These issues can range from security vulnerabilities, poor performance, and functionality errors. But most importantly, API flaws can lead to data breaches, system downtime, and damage to your company’s reputation. Therefore, it’s essential to thoroughly test and monitor APIs to detect and fix any flaws before they cause significant harm.

National Cybersecurity Strategy Implementation Plan published; Carrots and Sticks

This is the third installment in the National Cybersecurity Strategy series. To read the other two blogs, click here for part 1 and here for part 2. As I was drafting the third installment on the National Cybersecurity Strategy, the National Cybersecurity Strategy Implementation Plan was published. This follow-on document provides greater specificity on detailed actions to be taken. As such, moving forward, the two should be viewed together and assessed as a pair.

Accelerating API Security with Intel & Noname Security

Rick Echevarria, General Manager for Intel Security Center of Excellence and David Thomason, Worldwide Director of Alliances at Noname Security, sit down to discuss the expanding API attack surface, how the two companies are working together to provide next-generation API Security, as well as share their thoughts about the joint roadmap going forward. If you'd like to learn more about the partnership between Intel and Noname Security, please visit one of the following links.

How to Secure Your Financial Services APIs

Todd Hathaway, Solutions Architect, Global FinServ Practice for World Wide Technology (WWT), and Karl Mattson, CISO for Noname Security, sit down to discuss the rapidly expanding API attack surface and what financial services organizations need to do in order to protect themselves from malicious threats. By the time the video is done, you will have firm understanding of the ramifications if APIs are left insecure, as well as a set of industry-proven best practices that will help you immediately improve your API Security Posture.

What is Graph QL?

GraphQL is a query language for APIs that has become increasingly popular among developers working on large-scale web applications. Created by Facebook engineers in 2015, it’s positioned as a more robust alternative to RESTful APIs. When compared to REST APIs, GraphQL has a few key differences. With RESTful APIs, you have to define how you're going to make requests to each individual endpoint. You have a list of resources and verbs (methods) available to select from in order to retrieve or manipulate data from the server, and all transactions include all fields.

Horizontal vs Vertical Scaling: Which One is Better for APIs?

As the developer community is well aware, demand for application programming interfaces, or APIs, is not static. It usually ebbs and flows over time. For instance, during the holiday season, there could be a significant spike in traffic, requiring more API capacity to handle the increased load. To meet such an increase in traffic, system admins have two choices when it comes to scaling an API. They can go with horizontal scaling, which refers to adding more API instances to a cluster. Or vertical scaling, which means adding to the computing capacity of the machine that supports the API.

Uncover API Vulnerabilities with Posture Management

API posture management ensures that you put your best foot forward when it comes to API security. It combines API discovery with sensitive data identification and vulnerability detection, so your remediation efforts focus on the most critical APIs first. The ability to identify API vulnerabilities and remediate them quickly allows you to take corrective action before an attack occurs.

What is API Runtime Protection?

API runtime protection is the process of securing APIs as they operate and manage requests during their normal functioning. Blocking runtime API threats requires an understanding of the context of operations for each individual API, including API access, usage, and behavior. In addition, runtime protection should log API traffic, monitor sensitive data access, detect threats, and block or remediate attack vectors.

What is API Discovery?

In order to protect your entire API estate—and your business—you need to be able to discover all APIs in use of every type using automated processes. It’s essential to know which APIs you have exposed at all times—this is sometimes called an inside-out approach to API discovery. However, it has also become critical to discover potential attack vectors that make APIs vulnerable using an outside-in approach.

What is a Web Application Firewall (WAF)?

A web application firewall, better known as a WAF, is a security device designed to protect organizations at the application level. WAFs achieve this goal by monitoring, filtering, and analyzing traffic between the internet and a web application. Acting as a reverse proxy, the purpose of a common web application firewall is to shield applications from malicious requests.