The most important thing to remember is that you should not be afraid of your own shadow.

The second most important thing is that if you are, then it’s probably because someone has told you that the world was a scary place and they were trying to protect you from it. You can trust me on t ...

Continue Reading
Gartner just “created the category” of API security, and this is a big deal.

What does it mean for API Security Vendors? For those who have been working in the space for years, this news validates what we already know – that APIs are unique to each organization and require d ...

Continue Reading
I’m a software developer and I like to write about my experiences.

I've been writing code for fun since I was 12, and professionally since I was 18. My first job out of college was at Microsoft, where I worked on the Windows operating system in the kernel team. Since ...

Continue Reading
The most important thing is to have a good attitude.

If you're having fun, then that's the best way to improve. If you're not having fun, then it's probably time for a change of scenery. I've been playing since beta and I'm still learning new things eve ...

Continue Reading
The following list of security issues is not exhaustive, but it’s a good starting point.

I've included the OWASP category for each issue and also added some examples to illustrate how you could test for them. 1. Sensitive Data Exposure (A3) This is one of the most common problems with we ...

Continue Reading
The tools we use today to protect Web applications and APIs are often ineffective, inefficient, and even counterproductive.

The good news is that there's a better way forward. We can build modern security tools for the decentralized enterprise — but it will take time and effort to get there. The first step is understandin ...

Continue Reading
We’re hosting a webinar on September 21st to discuss the top five API security myths and how you can break through them

We're hosting a webinar on September 21st to discuss the top five API security myths and how you can break through them https://t.co/0wfGbnnJnf ...

Continue Reading
Never use non-null value auth tokens.

#3: APIs Exposing Sensitive Data in Cleartext This is not a new problem, but it has been brought to the forefront of many organizations’ minds after recent high profile incidents. The exposure of se ...

Continue Reading

Back to Main

Subscribe for the latest news: