Questions Answered: Let’s shift API security left – sure, but how?

You had questions, and we’ve got answers! Thank you for all the questions submitted on our webinar: “Let’s shift API security left – sure, but how?” Below is the replay and all the answers to the questions that were asked. If you’d like more information please feel free to contact us.     Don’t the cloud …




Questions Answered: The Anatomy of Four API Breaches

You had questions, and we’ve got answers! Thank you for all the questions submitted on our “The Anatomy of Four API Breaches” webinar. Below is the replay and all the answers to the questions that were asked. If you’d like more information please feel free to contact us.     Does the implementation of OAuth2 …


WEBINAR: The Anatomy of 4 API Breaches

Securing APIs implies securing the infrastructure but also the APIs themselves. Unfortunately, having all possible infrastructure protections in place is only one aspect of the recent OWASP Top10 for API Security. Other issues such as data leakage, mass assignment or broken authentication/authorization must be handled at the application level. In the past year or so, …


Questions Answered: REST API Security by Design with Azure Pipelines

You had questions, and we’ve got answers! Thank you for all the questions submitted on our “REST API Security by Design with Azure Pipelines” webinar. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us.   I know this API Security Audit requires …


WEBINAR: REST API Security by Design with Azure Pipelines

Join Microsoft and 42Crunch for a webinar on REST API Security by Design with Azure Pipelines: Watch Now >>   Presented by       REST API Security by Design with Azure Pipelines Security is an important topic in software development. Unfortunately, security is usually considered too late in software development, and especially in the …


Questions Answered: Protecting Microservices APIs with 42Crunch API Firewall

You had questions, and we’ve got answers! Thank you for all the questions submitted on our “Protecting Microservices APIs with 42Crunch API Firewall” webinar. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us.       Can the sidecar be tested somehow? …


WEBINAR: Protecting Microservices APIs with 42Crunch API Firewall 

In loosely coupled architectures, we must put in place application level security, should it be for client traffic (North-South) or intra-microservices traffic (East-West). In this webinar, we show you how the 42Crunch API firewall can be used to put API threat protection in place automatically, as early as design time. We’ll use a mix of …


Questions Answered: Are you properly using JWTs?

You had questions, and we’ve got answers! Thank you for all the questions submitted on our “Are you properly using JWTs?” webinar. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us.       Is it considered safe if the JWT token …