The way to get the best results from your training is to focus on improving your weaknesses.

This will allow you to improve faster than if you were just focusing on what’s easy for you. This means that, when it comes time to train, instead of doing a bunch of stuff that’s really fun and ea ...

Continue Reading
API Security is a new product that protects your APIs from attacks, including the OWASP Top 10.

tl;dr: API Security automatically generates a positive security model for every uploaded API Swagger file. tl;dr: Imperva’s API Security enables your teams to stay ahead of DevOps via automation htt ...

Continue Reading
If you’re not sure what your API is doing, then someone else will.

Monitor all API calls for suspicious activity and ensure that the source IP address of each request matches the originating user or device. Basic Web Application Attacks: Attacks with a sm ...

Continue Reading
The attack surface is much larger than it used to be, and the rate of change has increased dramatically.

API Security Process - A 5-Step Approach The following are five steps that can help organizations build an API security process:      1. Inventory APIs - The first step in building a successful AP ...

Continue Reading
– I’m a big fan of the game and it’s mechanics.

- The graphics are great, but could use some work on the animations. - It needs more content to be worth $10 https://t.co/rI4BYcFD67 ...

Continue Reading
The API security problem is getting worse, and the traditional approaches to securing APIs are failing.

The good news is that organizations can take action now to address these challenges by focusing on a few key areas: 1) Build context around API traffic - Identify all of your applications and their a ...

Continue Reading
I’m a software engineer at Google.

I work on the Chrome team, specifically in the WebRTC group. I also help out with other things like performance and security. My background: I got my PhD from Stanford University in 2010, where I wor ...

Continue Reading
Elastic Stack is a great tool, but it’s not secure out-of-the-box.

It requires some additional work to protect against the vulnerabilities we found https://t.co/4uE399nWVv ...

Continue Reading

Back to Main

Subscribe for the latest news: