Questions Answered: The Anatomy of Four API Breaches

You had questions, and we’ve got answers! Thank you for all the questions submitted on our “The Anatomy of Four API Breaches” webinar. Below is the replay and all the answers to the questions that were asked. If you’d like more information please feel free to contact us. Download Slide Deck PDF   Does the […]

Continue reading


WEBINAR: The Anatomy of 4 API Breaches

Securing APIs implies securing the infrastructure but also the APIs themselves. Unfortunately, having all possible infrastructure protections in place is only one aspect of the recent OWASP Top10 for API Security. Other issues such as data leakage, mass assignment or broken authentication/authorization must be handled at the application level. In the past year or so, […]

Continue reading


Questions Answered: REST API Security by Design with Azure Pipelines

You had questions, and we’ve got answers! Thank you for all the questions submitted on our “REST API Security by Design with Azure Pipelines” webinar. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us.        Download Slide Deck PDF […]

Continue reading


42Crunch Launches New REST API Static Security Testing Extension for Azure Pipelines 

Enables Azure DevOps customers to extend their DevSecOps practices to REST APIs IRVINE, CA, MARCH 18, 2020 — Today, the API security leader and creator of REST API DevSecOps tooling and the industry’s first API Firewall, 42Crunch, announced the launch of their new REST API Static Security Testing extension for Microsoft Azure Pipelines. This extension […]

Continue reading


WEBINAR: REST API Security by Design with Azure Pipelines

Join Microsoft and 42Crunch for a webinar on REST API Security by Design with Azure Pipelines: Watch Now >>   Presented by       REST API Security by Design with Azure Pipelines Security is an important topic in software development. Unfortunately, security is usually considered too late in software development, and especially in the […]

Continue reading


42Crunch Adds Self Registration and Low-cost Tiers to API Security Platform

42Crunch Democratizes API Security by Adding Self Registration, Free and Low-Cost Tiers to Their Comprehensive API Security Platform   SAN FRANCISCO, FEBRUARY 25, 2020 — Today at the RSA Conference, API security leader and creator of the industry’s first API Firewall – 42Crunch – announced the launch of its new self-registration feature for their API […]

Continue reading


Questions Answered: Protecting Microservices APIs with 42Crunch API Firewall

You had questions, and we’ve got answers! Thank you for all the questions submitted on our “Protecting Microservices APIs with 42Crunch API Firewall” webinar. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us.    Download Slide Deck PDF   Can the […]

Continue reading


WEBINAR: Protecting Microservices APIs with 42Crunch API Firewall 

In loosely coupled architectures, we must put in place application level security, should it be for client traffic (North-South) or intra-microservices traffic (East-West). In this webinar, we show you how the 42Crunch API firewall can be used to put API threat protection in place automatically, as early as design time. We’ll use a mix of […]

Continue reading


Questions Answered: Are you properly using JWTs?

You had questions, and we’ve got answers! Thank you for all the questions submitted on our “Are you properly using JWTs?” webinar. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us. Don’t forget to register for our next webinar on February 20th: […]

Continue reading


42C API Firewall and API Management: why you need both!

Every day, new breaches show us that we still have a long way to go with API security. In order to protect APIs, enterprises need to take a holistic approach, which includes the following: Securing the infrastructure: OS configuration, network configuration as well as containers. Properly configuring application servers: enforce TLS 1.2/1.3, remove weak cipher […]

Continue reading