? Recommendation: As part of your shift left process, consider adding a security review step to the development cycle.

This will help identify potential issues early in the life cycle and allow for remediation before production deployment. Is there an API gateway that can shield right while shifting left? The panel ...

Continue Reading
The problem is that the “D” in DBI stands for Database.

The Perl DBI module was designed to work with a database server, and it's not really possible to use it without one (or at least some kind of persistent storage). If you want to write your data direct ...

Continue Reading
I’m a software engineer at Google, I live in San Francisco and I like to travel.

I grew up in the suburbs of Chicago and went to college at Northwestern University where I studied computer science. After graduating, I worked for a year as an intern on the Google Maps team before m ...

Continue Reading
API security is a unique challenge that requires a different approach to web application testing.

Static code analysis and API-aware firewalls are not enough for securing APIs, as they do not identify the logic flaws that lead to major breaches. The best way to protect your APIs is by using an aut ...

Continue Reading
The API economy is booming, and with it comes a new set of security challenges.

In this report we examine how enterprises are addressing the risks associated with APIs. We also look at what's in store for the future of application security as organizations continue to integrate t ...

Continue Reading
We are a security company that helps you secure your APIs.

We do this by providing tools, training and consulting services to help you build secure APIs https://t.co/CDdop64Hgd ...

Continue Reading
I’ve been playing around with the new Google Maps API v3, and I’m pretty impressed.

Google recently announced that they were releasing a beta version of their new mapping API, which is based on HTML5 rather than Flash. This has been getting some attention in the tech press lately (se ...

Continue Reading
Don’t make the same mistake as Microsoft.

BOLA on Topcoder: Another IDOR vulnerability disclosed, this time in the Topcoder portal The second BOLA/IDOR vulnerability was discovered by researchers at Synopsys and reported to UpGuard Security ...

Continue Reading

Back to Main

Subscribe for the latest news: