Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Wallarm

API Attack Surface: How to secure it and why it matters

Managing an organization’s attack surface is a complex problem involving asset discovery, vulnerability analysis, and continuous monitoring. There are multiple well-defined solutions to secure the attack surface, such as extended detection and response (EDR or XDR), security information & event management (SIEM), and security orchestration, automation & response (SOAR); despite that, these tools often do not prioritize APIs.

Evolution of Attack Surface Management

While it was not called ASM, the concept of managing attack surface management began with basic asset management practices in the late 1990s and early 2000s. Organizations focused on keeping an inventory of their digital assets, such as servers, desktops, and network devices. The primary objective was to maintain an accurate record of these assets to ensure proper configuration and patch management.

AI in API Security: How Artificial Intelligence Enhances API Protection"

Explore how artificial intelligence is revolutionizing API security by detecting and mitigating threats in real-time. In this video, we discuss the growing importance of AI in safeguarding APIs against malicious attacks and how it helps organizations stay ahead of evolving cyber threats.

API Security Best Practice by GigaOm #apisecurity #apiattacks #apimonitoring #cybersecurity

In this video, we highlight the most critical criteria for effective API security, helping you understand what to prioritize in your security strategy. Learn how to evaluate and implement key API security measures to protect your organization from growing cyber threats.

The Other Crowdstrike Outage

On July 19, 2024, a flawed update in CrowdStrike Falcon's channel file 291 led to a logic error that caused Windows systems to crash, resulting in widespread BSOD (Blue Screen of Death) incidents. The impact was severe, disrupting critical infrastructure globally, from grounded flights to halted public transit systems. In fact, you’d have to have been living under a rock to have missed this incident.

API Leaks: Identifying and Preventing Data Exposure

In this video, we explore the growing concern of API leaks and how they can lead to significant data exposure. Learn about the key strategies for identifying and preventing API leaks to protect your organization’s sensitive information. Our experts provide actionable insights on mitigating risks associated with API vulnerabilities.

Unveiling Top API Vulnerabilities and Emerging Trends: Introducing the Wallarm Q2 2024 API ThreatStats Report

As we move through 2024, the Wallarm Research Team continues to monitor the evolving API vulnerability and threat landscape. Our latest Q2 ThreatStats Report reveals critical trends and developments that are reshaping the security environment. Continuing from our Q1 findings, the surge in AI API vulnerabilities is not only persisting but intensifying, with an alarming increase in both the volume and severity of exploits.

API Attacks: Understanding Malicious and Malformed Threats

This video dives into two critical categories of API attacks: malicious intentions and malformed API threats. Learn why these dangers are becoming increasingly significant for modern companies and how API security can help prevent major incidents. Experts from GigaOm and Wallarm discuss how to identify and mitigate these vulnerabilities to ensure the safety of your data.