Webinars

The Anatomy of API Breaches

Presented by:

Isabelle Mauny 
Field CTO and Co-founder

Securing APIs implies securing the infrastructure but also the APIs themselves. Unfortunately, having all possible infrastructure protections in place is only one aspect of the recent OWASP Top10 for API Security. Other issues such as data leakage, mass assignment or broken authentication/authorization must be handled at the application level.

In the past year or so, more than 200 breaches have been published on apisecurity.io. Some very well-known names are on that list. What did they do wrong? How can we learn from their mistakes and take an approach that prevents most common API abuse?

Our goal in this webinar is to share pragmatic, direct actionable best practices. Taking real breaches as examples, we will analyze what went wrong and how those breaches could have been prevented.

Webinar Follow-up

Hope you enjoyed the webinar! Below you can download the slide deck, visit our blog 
for full Q&A and learn more about 42Crunch! 

The Anatomy of API 
Breaches Slide Deck

Download

The Anatomy of API 
Breaches Q&A Blog

Read the Blog

42Crunch API Security 
Platform Data Sheet

Download
Webinars: Watch our OWASP API Security Top 10 for tips on how to protect your APIs.
Watch Now

Resources

Want to learn more? Here are some resources to help you out.

Free Tools

Looking to make OpenAPI / Swagger editing easier? Or want to see how secure your API is? Check out our free tools.

Get the Tools!

API Security Top 10

Learn more about the OWASP API Security Top 10, how 42Crunch can help, and download our cheat sheet!

Learn More

Better Together

Already have API Management? Great! The 42Crunch API Security Platform is the perfect compliment. Get the data sheet.

Download

Ready to Get Started?

Developer-first solution for delivering API security as code.