#3: APIs Using Non-Random Tokens Another common issue with auth tokens is the use of non-random values for them, such as sequential numbers or dates that are easy to guess. This is a problem because ...
Continue ReadingOctober 08, 2021
Salt Security is a cloud-based API security platform that provides visibility, control and protection for APIs https://t.co/m4JpVEZU9W ...
Continue ReadingOctober 08, 2021
Now, it's out there and Microsoft can't patch it. The post The new math of cybersecurity value appeared first on CSO Online https://t.co/sAmX7OY8hk ...
Continue ReadingOctober 08, 2021
The first step is to establish a feedback loop between SecOps and DevOps teams. This requires the creation of an API security policy that defines how APIs should be secured in accordance with business ...
Continue ReadingOctober 08, 2021
We'll see you in September! tl;dr: We're not going to be doing a July issue. We'll see you in September https://t.co/lnKLyNJZhY ...
Continue ReadingOctober 08, 2021
The best way to get the most out of your time at a conference is to have an agenda, and stick to it https://t.co/6AKab5OWnH ...
Continue ReadingOctober 08, 2021
I've been working on a new project called "Sketch" for the past few months. It's an open source tool that helps you design your APIs before writing any code. You can use it to explore API designs, doc ...
Continue ReadingOctober 08, 2021
The best way for SecOps teams to understand how APIs are being used is by creating a feedback loop that continuously discovers, monitors, and secures APIs across the enterprise. This process should be ...
Continue ReadingOctober 08, 2021
Back to Main