CloudVector provides a flexible security policy based on “Parameter Pinning,” which accurately identifies API calls that misuse this vulnerability and automatically protects against this threat by terminating the API session.

Broken Access Control   API access control is critical to protect sensitive data from unauthorized users. For example, an attacker can use stolen authentication tokens or brute force attacks to gai ...

Continue Reading
Gravitee.

io is an API management platform that allows you to easily manage your APIs and their access, identity and usage policies in one place https://t.co/JqXce4OiXm ...

Continue Reading
Authorino is a reverse-proxy layer that provides authentication and authorization for APIs.

It can be deployed on Kubernetes, and it’s easy to configure via the API of your choice. Authorino: Under the hood Authorino consists of two main components: an internal proxy server (the Authorino ...

Continue Reading
I’m a software developer and I like to write.

I started programming when I was 10 years old, doing BASIC on my C64. In the late 90s, I got into Linux and learned Perl (and later PHP) as a way of automating tasks that were otherwise tedious or dif ...

Continue Reading
I’m getting the hang of this.

I was determined to get better at my job, so I took a class on how to be an effective manager. It was very helpful and I learned a lot about myself as well as other people in the class. One thing that ...

Continue Reading
API security is a critical part of your digital transformation strategy.

The NIST CSF can help you get started with a baseline assessment of your current state and future goals for API risk management. Want to learn more about the NIST Cybersecurity Framework? Visit https: ...

Continue Reading
We’re the best in API security, and we’re going to prove it at API World.

Salt Wins Best in API Security – “Nuff Said!” It’s one thing for us at Salt to say we’re the best in API security – it’s quite another for the team at API World to say it. And they just did. F ...

Continue Reading
Use JWTs for internal tokens and OAuth2.

0 Bearer Tokens for external tokens 4. Use a Secure Hash Algorithm to Sign Your Tokens When signing your tokens, use the strongest algorithm available in your infrastructure: SHA-256 or better. If y ...

Continue Reading

Back to Main

Subscribe for the latest news: