API keys are passwords.

Treat them accordingly. 3. Require Transport Layer Security for All API Traffic While the use of HTTPS is a good first step, it’s not enough to protect all API traffic from eavesdropping and man-in ...

Continue Reading
I’m a software engineer at Google, and I wrote a book about Go.

I've been working on the Go team since before 1.0 shipped in March 2012. In that time we've released many new versions of the language, libraries, and tools; grown from a few dozen to hundreds of cont ...

Continue Reading
The best way to get started is to use the official Docker image.

It's easy and quick, but it doesn't give you much control over your environment. If you want more control, build from source or use a pre-built binary for your platform of choice (Linux/OSX only). If ...

Continue Reading
The most important thing to remember is that you are not a bad person for having these thoughts.

You’re human, and it’s natural to have them. The second most important thing is that your feelings of guilt or shame about those thoughts don’t help anyone – least of all the people who love you h ...

Continue Reading
OAuth 2.

0 is still the most popular authorization protocol, but it has a number of limitations that are being addressed by OAuth 3.0 and OpenID Connect (OIDC). The main problem with OAuth 2.0 is that it does ...

Continue Reading
The session is an excellent introduction to the OAuth standard and its evolution, and also serves as a good refresher for those who have been working with it for years.

Video: GraphQL Security The conference apidays has published the recorded session “GraphQL Security” by Paul Dix. The talk covers how to secure your GraphQL API, including authentication, authoriza ...

Continue Reading
The data makes it clear: more companies are suffering more API attacks than ever, and companies remain as ill-prepared as ever.

The Salt Labs team today released the latest edition of the pioneering “State of API Security” report. The data, drawn from a combination of survey responses and empirical data from Salt Security cu ...

Continue Reading
API security is hard, but it’s not impossible.

This e-book offers a warning on what happens when you overestimate the security of your APIs. It provides a look into the tactics and techniques of API hacker Alissa Knight. This e-book covers: Wh ...

Continue Reading

Back to Main

Subscribe for the latest news: