The feedback loop that discovers, monitors, and secures API transactions is the key to bridging the gap between SecOps and DevOps.

The solution lies in a feedback loop that can discover, monitor, and secure APIs at scale – without slowing down development teams. This process begins with an automated discovery of all APIs within ...

Continue Reading
I’m not a fan of the “I don’t like it, so I won’t use it.

It must be bad!” attitude that seems to be prevalent in this thread. The main reason I am posting here is because I want to make sure you know why we made these changes and what our goals were when ...

Continue Reading
If you are a newbie, don’t be afraid to ask questions.

If you are an expert, help out the community by answering questions when possible https://t.co/mCKCcLiGuu ...

Continue Reading
“Zero Trust” is a myth in API security The reality of ZTA and ZTNA is that they are not practical for most organizations.

The amount of work required to implement them, the cost associated with building out supporting technologies, and the complexity of managing all this technology can be overwhelming. Organizations need ...

Continue Reading
API Security is a top priority for organizations, but the tools and processes being used to secure APIs are failing.

The Salt SaaS platform provides API security solutions that can help your organization address these challenges. Learn more about how SaltStack helps protect against API attacks in our whitepaper: The ...

Continue Reading
I’m a software developer who loves to travel.

I’ve been working remotely for the past 2 years, and have visited over 20 countries. I was born in the United States, but grew up traveling between Germany, France, and the US as my family moved aro ...

Continue Reading
I’m a big fan of the new “modular” approach to CSS.

I think it's going to be really powerful, and will make our lives as developers much easier. But there are some things that we need to keep in mind when using it: 1) It is not magic; you still have t ...

Continue Reading
APIs are everywhere! APIs: Security challenges and best practices  With APIs being used in so many ways, it is not surprising that the security of APIs has emerged as a critical concern.

The most common vulnerabilities found in modern applications today include SQL injection, cross-site scripting (XSS), insecure direct object references (IDORs), etc., which can be exploited to steal d ...

Continue Reading

Back to Main

Subscribe for the latest news: