APIs are increasingly being used by other APIs too.

A public facing API may call internal APIs to get the data required to form a response. User-supplied data may be used in the paths for those internal API requests, and without proper sanitation of th ...

Continue Reading
Technical debt is a real problem for API security.

Old code can be vulnerable to new attacks, and the ubiquity of APIs means they're often used by other APIs too. This article was originally published on our sister site, The Next Web . Copyright 2018 ...

Continue Reading
1.

Technical debt is everywhere, and it's a problem for security because corners are cut to get things out the door quickly. 2. APIs are often used by other APIs, meaning that old code can be vulnerable ...

Continue Reading
The best way to get a job is by being the most qualified person for that job.

The only way you can be the most qualified person for any given job is if you have experience doing that exact thing in an environment where it was successful. If you don't have experience, then your ...

Continue Reading
Curity has been acquired by Ping Identity, and we are now part of the Ping Identity family.

Ping Identity is a leading provider of identity solutions for enterprises to secure their digital business. The company's flagship product PingOneĀ® enables customers to securely manage access to clou ...

Continue Reading
I’m a software developer.

I have been for over 20 years now, and I love it! I started programming when I was 12 years old. My first computer was an Amiga 500 with a whopping 1MB of RAM (yes, that's megabytes). It had no hard ...

Continue Reading
I want to know if I’m doing something wrong or if there’s a bug with the way that we’re handling this.

I've been working on an app for a few months now, and it's gone through several iterations of design. The latest iteration has me using UICollectionViews in place of table views, which is great becaus ...

Continue Reading
API Security is a top priority for enterprises, and API Sentinel provides continuous runtime visibility into all your exposed APIs.

This includes external-facing (North-South) as well as internal (East-West) APIs. Continuous risk analysis helps uncover sensitive data leakage, specification non-conformance, use of weak authenticati ...

Continue Reading

Back to Main

Subscribe for the latest news: