How to Protect Your Business From API Data Leaks

How to Protect Your Business From API Data Leaks

May 16, 2024

Application Programming Interfaces (APIs) are rapidly becoming the primary attack vector for cloud native applications. In fact, according to one study, 92% of organizations have already experienced a security incident resulting from insecure APIs. This is because loosely coupled microservices predominantly intercommunicate via APIs. In this video, we will analyze a ‘ripped from the headlines’ case-study example of data leakage via insecure APIs. Then we will examine various API vulnerabilities that can be exploited by attackers to enable data leaks, including Broken User Authentication (BUA), Broken Object Level Authentication (BOLA), and Broken Function-Level Authentication (BFLA). Finally, we will see how these types of vulnerabilities can be quickly and easily identified Panoptica.

Outshift is Cisco’s incubation engine, innovating what's next and new for Cisco products and sharing our expertise on emerging technologies. Discover the latest on cloud native applications, cloud application security, generative AI, quantum networking and security, future-forward tech research, our latest open source projects and more.

Keep up with the speed of innovation:

→ Learn more:
→ Read our blog:

Connect with us on social media:
→ LinkedIn:
→ Twitter / X:
→ Subscribe to our YouTube channel: