Every day, new breaches show us that we still have a long way to go with API security. In order to protect APIs, enterprises need to take a holistic approach, which includes the following: Securing the infrastructure: OS configuration, network configuration as well as containers. Properly configuring application servers: enforce TLS 1.2/1.3, remove weak cipher …
api security
WEBINAR: Are You Properly Using JWTs?
JSON Web tokens (JWTs) are used massively in API-based applications as access tokens or to transport information across services. Unfortunately, JWT are often mis-used and incorrectly handled. Massive data breaches have occurred in the last 18 months due to token leakage and lack of proper of validation. This session focuses on best practices and real …
Questions Answered: No BS 42Crunch Platform Demo
You had questions, and we’ve got answers! Thank you for all the questions submitted on the No BS 42Crunch Platform Demo on January 9th. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us. On the content-type validation: are you supporting …
WEBINAR: 42Crunch Platform Demo: No PowerPoint, no BS, just ACTION!
Here’s the deal… The 42Crunch solution lets you describe security as code as part of your OpenAPI specification files, allowing you to entirely automate the API security process, from the very beginning of the API lifecycle. Developers can simply annotate their API contracts to describe the required security policies and we process those annotations to …
Questions Answered: Positive Security for APIs Webinar
You had questions, and we’ve got answers! Thank you for all the questions submitted on the Positive Security for APIs: What it is and why you need it! We couldn’t get to all of them so we wanted to follow-up with a full list of all the Q&A – and the slide deck as well! …
OWASP API Security Top 10 Cheat Sheet
Download our OWASP API Security Cheat Sheets to print out and hang on your wall! US Letter 8.5 x 11 in | A4 210 x 297 mm If you missed our latest presentation, check out the slides here: Visit the APIsecurity.io encyclopedia to learn more about the OWASP API Security Top 10. …
WEBINAR: Positive Security for APIs – What it is and why you need it!
Positive Security for APIs: What it is and why you need it! Many of the issues on the OWASP API Security Top 10 are triggered by the lack of input or output validation. Here are a few illustrative real-life examples on this: Drupal suffered a major issue in February 2019: a remote code execution flaw …
Questions Answered: OWASP API Security Top 10 Webinar
You had questions, and we’ve got answers! Thank you for all the questions submitted on the OWASP API Security Top 10 webinar on Nov 21. We couldn’t get to all of them so we wanted to follow-up with a full list of all the Q&A – and the slide deck as well! How do …
WEBINAR: The OWASP API Security Top 10
The OWASP API Security Top 10 In recent years, large reputable companies such as Facebook, Google and Equifax have suffered major data breaches that combined exposed the personal information of hundreds of millions of people worldwide. The common vector linking these breaches – APIs. The scale and magnitude of these breaches are the reason API …
Deploying DevSecOps for APIs: a tale of shifting left…
DevSecOps is a hot topic at the moment, and particularly relevant when dealing with API development. APIs are growing at an exponential rate: not only are they the backbone of any application, but microservices architecture imply exposing internal APIs for every microservice or group of microservices. The average number of APIs to protect within an …