#api-security

[ follow ]
cybersecurity
ITPro
1 week ago
Information security

APIcalypse Now: Akamai CSO warns of surging attacks and backdoored open source components

Boaz Gelbord warned of the increasing trend of attacks targeting applications and APIs, emphasizing the challenges organizations face in inventorying and securing APIs. [ more ]
TechCrunch
1 week ago
Information security

Akamai confirms acquisition of Noname for $450M | TechCrunch

Akamai acquires Noname Security for $450 million, reflecting the consolidation trend in the cybersecurity market. [ more ]
TechCrunch
2 weeks ago
Information security

Citigroup's VC arm invests in API security startup Traceable | TechCrunch

API attacks are increasing, highlighting the need for improved API security measures. [ more ]
Entrepreneur
2 months ago
Privacy professionals

How to Create Cohesion Within Your Organization's Cybersecurity | Entrepreneur

Data protection and digital privacy are crucial for C-suite leaders.
Leaders must ensure cohesion across the IT security stack for effective cybersecurity. [ more ]
DevOps.com
3 months ago
Information security

Graylog Makes Free API Security Tool Available to Developers - DevOps.com

Graylog has released a free version of its API security platform to encourage developers to adopt best practices in securing their APIs.
The free version has all the capabilities of the paid version but is limited to 16GB of local rolling storage on a single node with a one-year renewable license.
The platform includes capabilities such as API classification, discovery, risk scoring, continuous monitoring, and the ability to capture API request and response payloads. [ more ]
morecybersecurity
InfoQ
4 weeks ago
DevOps

Protecting APIs in Financial Services with Zero Trust Overlay Mesh Networks

Zero trust is crucial in financial services for API connections and service identity verification. [ more ]
Pythonbytes
1 month ago
Python

Every dunder method in a Python Lockbox

The importance of controlling what search engines and AI scrapers are allowed to visit through a specific file or protocol.
The development of tools like Niquests as a drop-in replacement for Requests, aiming for better features and enhancements. [ more ]
App Developer Magazine
5 months ago
Privacy professionals

API security risks report exposes Netflix and Wordpress| App Developer Magazine

Wallarm released its Q3-2023 API ThreatStats report, detailing the surge in threats centered around APIs and uncovering critical vulnerabilities.
Injections, cross-site attacks, broken access control, and poor session and password management were among the top API security threats identified.
Authentication, authorization, and access control (AAA) vulnerabilities accounted for 33% of the total vulnerabilities, with OAuth, SSO, and JSON Web Token (JWT) compromised in reputable organizations such as Sentry and WordPress. [ more ]
App Developer Magazine
5 months ago
Privacy professionals

API security risks report exposes Netflix and Wordpress| App Developer Magazine

Wallarm released its Q3-2023 API ThreatStats report, detailing the surge in threats centered around APIs and uncovering critical vulnerabilities.
Injections, cross-site attacks, broken access control, and poor session and password management were among the top API security threats identified.
Authentication, authorization, and access control (AAA) vulnerabilities accounted for 33% of the total vulnerabilities, with OAuth, SSO, and JSON Web Token (JWT) compromised in reputable organizations such as Sentry and WordPress. [ more ]
App Developer Magazine
5 months ago
Information security

API security risks report exposes Netflix and Wordpress| App Developer Magazine

Wallarm released its Q3-2023 API ThreatStats report, detailing the surge in threats centered around APIs and uncovering critical vulnerabilities.
Injections, cross-site attacks, broken access control, and poor session and password management were among the top API security threats identified.
Authentication, authorization, and access control (AAA) vulnerabilities accounted for 33% of the total vulnerabilities, with OAuth, SSO, and JSON Web Token (JWT) compromised in reputable organizations such as Sentry and WordPress. [ more ]
[ Load more ]