Shift left: Shift your security testing to the API level.

You can use a tool like Cequence Security’s API2Secure to test for vulnerabilities and secure your APIs. Shield right: Use an API gateway such as Kong or NGINX that will protect your web applications ...

Continue Reading
The most important thing to remember is that you should not be afraid of your own shadow.

The second most important thing is that if you are, then it’s probably because someone has told you that the world was a scary place and they were trying to protect you from it. You can trust me on t ...

Continue Reading
Gartner just “created the category” of API security, and this is a big deal.

What does it mean for API Security Vendors? For those who have been working in the space for years, this news validates what we already know – that APIs are unique to each organization and require d ...

Continue Reading
I’m a software developer and I like to write about my experiences.

I've been writing code for fun since I was 12, and professionally since I was 18. My first job out of college was at Microsoft, where I worked on the Windows operating system in the kernel team. Since ...

Continue Reading
The most important thing is to have a good attitude.

If you're having fun, then that's the best way to improve. If you're not having fun, then it's probably time for a change of scenery. I've been playing since beta and I'm still learning new things eve ...

Continue Reading
The following list of security issues is not exhaustive, but it’s a good starting point.

I've included the OWASP category for each issue and also added some examples to illustrate how you could test for them. 1. Sensitive Data Exposure (A3) This is one of the most common problems with we ...

Continue Reading
The tools we use today to protect Web applications and APIs are often ineffective, inefficient, and even counterproductive.

The good news is that there's a better way forward. We can build modern security tools for the decentralized enterprise — but it will take time and effort to get there. The first step is understandin ...

Continue Reading
We’re hosting a webinar on September 21st to discuss the top five API security myths and how you can break through them

We're hosting a webinar on September 21st to discuss the top five API security myths and how you can break through them https://t.co/0wfGbnnJnf ...

Continue Reading

Back to Main

Subscribe for the latest news: