Questions Answered: Protecting Microservices APIs with 42Crunch API Firewall

You had questions, and we’ve got answers! Thank you for all the questions submitted on our “Protecting Microservices APIs with 42Crunch API Firewall” webinar. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us.       Can the sidecar be tested somehow? …


WEBINAR: Protecting Microservices APIs with 42Crunch API Firewall 

In loosely coupled architectures, we must put in place application level security, should it be for client traffic (North-South) or intra-microservices traffic (East-West). In this webinar, we show you how the 42Crunch API firewall can be used to put API threat protection in place automatically, as early as design time. We’ll use a mix of …


Questions Answered: Are you properly using JWTs?

You had questions, and we’ve got answers! Thank you for all the questions submitted on our “Are you properly using JWTs?” webinar. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us.       Is it considered safe if the JWT token …


WEBINAR: Are You Properly Using JWTs?

JSON Web tokens (JWTs) are used massively in API-based applications as access tokens or to transport information across services. Unfortunately, JWT are often mis-used and incorrectly handled. Massive data breaches have occurred in the last 18 months due to token leakage and lack of proper of validation. This session focuses on best practices and real …


Questions Answered: No BS 42Crunch Platform Demo

You had questions, and we’ve got answers! Thank you for all the questions submitted on the No BS 42Crunch Platform Demo on January 9th. Below are all the answers to the questions that were asked. If you’d like more information please feel free to contact us.     On the content-type validation: are you supporting …


WEBINAR: 42Crunch Platform Demo: No PowerPoint, no BS, just ACTION!

Here’s the deal… The 42Crunch solution lets you describe security as code as part of your OpenAPI specification files, allowing you to entirely automate the API security process, from the very beginning of the API lifecycle. Developers can simply annotate their API contracts to describe the required security policies and we process those annotations to …



WEBINAR: Positive Security for APIs – What it is and why you need it!

Positive Security for APIs: What it is and why you need it! Many of the issues on the OWASP API Security Top 10 are triggered by the lack of input or output validation. Here are a few illustrative real-life examples on this: Drupal suffered a major issue in February 2019: a remote code execution flaw …



WEBINAR: The OWASP API Security Top 10

The OWASP API Security Top 10 In recent years, large reputable companies such as Facebook, Google and Equifax have suffered major data breaches that combined exposed the personal information of hundreds of millions of people worldwide. The common vector linking these breaches – APIs. The scale and magnitude of these breaches are the reason API …