It's not finished yet, but it's getting there! The game is playable right now (see the demo video above), but there are still some bugs to fix and features to add before it can be considered "done". ...
Continue ReadingSeptember 27, 2021
Any user or attacker with Internet access could query the APIs directly and obtain volumes of PII. Broken object level authorization Once an attacker had discovered the endpoint URL, they still nee ...
Continue ReadingSeptember 27, 2021
It's also about protecting the data that flows through your APIs. The most common way to do this is with access control lists (ACLs). ACLs are rules that determine who can see and use an API, as well ...
Continue ReadingSeptember 27, 2021
As a result, security testing of APIs has become a critical component of the overall enterprise risk management program. In this webinar we will discuss: What is needed to mature your security testi ...
Continue ReadingSeptember 27, 2021
The game is fun, but the community is not https://t.co/TYNWIwsyl8 ...
Continue ReadingSeptember 27, 2021
The new application attack surface, the need for speed and agility, and the rise of cloud computing are all driving a fundamental shift in how we think about protecting APIs. The post 5 Common Securi ...
Continue ReadingSeptember 27, 2021
The good news is that there are tools available to help organizations test their APIs for vulnerabilities and excessive permissions. These tools can be used both before deployment and after production ...
Continue ReadingSeptember 27, 2021
What does this mean for you? Gartner has made it clear that organizations need dedicated API protection to secure their APIs, and they need to do more than just add a WAF or gateway on top of existin ...
Continue ReadingSeptember 27, 2021
Back to Main