You had questions, and we've got answers! Thank you for all the questions submitted on our "42Crunch Security Audit for WSO2 API Manager 3.1" webinar. Below is the replay and all the answers to the questions that were asked. If you'd like more information please feel free to contact ...
You had questions, and we've got answers! Thank you for all the questions submitted on our "Top API Security Issues Found During POCs" webinar. Below is the replay and all the answers to the questions that were asked. If you'd like more information please feel free to contact us. ...
You had questions, and we've got answers! Thank you for all the questions submitted on our "The Anatomy of Four API Breaches" webinar. Below is the replay and all the answers to the questions that were asked. If you'd like more information please feel free to contact us. ...
Securing APIs implies securing the infrastructure but also the APIs themselves. Unfortunately, having all possible infrastructure protections in place is only one aspect of the recent OWASP Top10 for API Security. Other issues such as data leakage, mass assignment or broken authenticat...
You had questions, and we've got answers! Thank you for all the questions submitted on our "REST API Security by Design with Azure Pipelines" webinar. Below are all the answers to the questions that were asked. If you'd like more information please feel free to contact us. ...
Join Microsoft and 42Crunch for a webinar on REST API Security by Design with Azure Pipelines: Watch Now >> Presented by REST API Security by Design with Azure Pipelines Security is an important topic in software development. Unfortunately, securi...
You had questions, and we've got answers! Thank you for all the questions submitted on our "Protecting Microservices APIs with 42Crunch API Firewall" webinar. Below are all the answers to the questions that were asked. If you'd like more information please feel free to contact us. ...
In loosely coupled architectures, we must put in place application level security, should it be for client traffic (North-South) or intra-microservices traffic (East-West). In this webinar, we show you how the 42Crunch API firewall can be used to put API threat protection in place auto...
You had questions, and we've got answers! Thank you for all the questions submitted on our "Are you properly using JWTs?" webinar. Below are all the answers to the questions that were asked. If you'd like more information please feel free to contact us. [xyz-ihs snippet=...
JSON Web tokens (JWTs) are used massively in API-based applications as access tokens or to transport information across services. Unfortunately, JWT are often mis-used and incorrectly handled. Massive data breaches have occurred in the last 18 months due to token leakage and lack of pro...